Security Application Model Based on Identification Management for Cloud Computing
- DOI
- 10.2991/icfcce-14.2014.49How to use a DOI?
- Keywords
- Cloud Computing, Identity Management, Safety Access, Audit, Consistent Hash Ring
- Abstract
Aiming at the challenge of entity identity management technology in cloud computing environments, we propose a security application model based on identification management, and present a security access method based on privacy protection and audit about the entity uniform identity management. In this paper, the multi-entity identification encoded by using the unified structure is introduced, and the method to achieve the secure access of RP by the local identification based on UUID and privacy protection is proposed. We also describe the audit of multi-entity identification association mapping, thus these methods realize the identity management of entities in cloud computing environments. The identification management method we proposed has the advantages of strong universality, convenient storage and inquiry. The access method has higher security.
- Copyright
- © 2014, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yazhe Wang AU - Shunan Ma AU - Yu Wang PY - 2014/03 DA - 2014/03 TI - Security Application Model Based on Identification Management for Cloud Computing BT - Proceedings of the 2014 International Conference on Future Computer and Communication Engineering PB - Atlantis Press SP - 197 EP - 202 SN - 1951-6851 UR - https://doi.org/10.2991/icfcce-14.2014.49 DO - 10.2991/icfcce-14.2014.49 ID - Wang2014/03 ER -