Proceedings of the 2014 International Conference on Future Computer and Communication Engineering

Security Application Model Based on Identification Management for Cloud Computing

Authors
Yazhe Wang, Shunan Ma, Yu Wang
Corresponding Author
Yazhe Wang
Available Online March 2014.
DOI
10.2991/icfcce-14.2014.49How to use a DOI?
Keywords
Cloud Computing, Identity Management, Safety Access, Audit, Consistent Hash Ring
Abstract

Aiming at the challenge of entity identity management technology in cloud computing environments, we propose a security application model based on identification management, and present a security access method based on privacy protection and audit about the entity uniform identity management. In this paper, the multi-entity identification encoded by using the unified structure is introduced, and the method to achieve the secure access of RP by the local identification based on UUID and privacy protection is proposed. We also describe the audit of multi-entity identification association mapping, thus these methods realize the identity management of entities in cloud computing environments. The identification management method we proposed has the advantages of strong universality, convenient storage and inquiry. The access method has higher security.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2014 International Conference on Future Computer and Communication Engineering
Series
Advances in Intelligent Systems Research
Publication Date
March 2014
ISBN
978-94-6252-005-9
ISSN
1951-6851
DOI
10.2991/icfcce-14.2014.49How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yazhe Wang
AU  - Shunan Ma
AU  - Yu Wang
PY  - 2014/03
DA  - 2014/03
TI  - Security Application Model Based on Identification Management for Cloud Computing
BT  - Proceedings of the 2014 International Conference on Future Computer and Communication Engineering
PB  - Atlantis Press
SP  - 197
EP  - 202
SN  - 1951-6851
UR  - https://doi.org/10.2991/icfcce-14.2014.49
DO  - 10.2991/icfcce-14.2014.49
ID  - Wang2014/03
ER  -