International Journal of Future Generation Communication and Networking Vol. 11, No. 1 (2018), pp.23-36 http://dx.doi.org/10.14257/ijfgcn.2018.11.1.03 ISSN: 2233-7857 IJFGCN Copyright © 2018 SERSC Australia Secured Identity Management System for Preserving Data Privacy and Transmission in Cloud Computing 1 Garima Rastogi 1* and Rama Sushil 2 1* Computer Science and Engineering Department, DIT University, Dehradun INDIA 2 Department of Information Technology, DIT University, Dehradun INDIA garimaverma.research@gmail.com ramasushil@yahoo.co.in Abstract In this era of globalization, cloud computing is being preferred for management and maintenance of data and services across sectors such as health, banking, manufacturing, national security services etc. Therefore, it becomes extremely important to make ample provision for data confidentiality and privacy. In short, data security is a very important issue which needs to be addressed properly to enhance the usage of cloud computing. In this manuscript, some vulnerability issues have been identified in the conventional identity management (IDM) systems that are used currently. This paper proposes a novel identity management system for secure data transmission and preserving data privacy in cloud environment called (SIDM). The proposed system will overcomes issues such as network traffic interception, IDM compromise and replay attack. In comparison to general IDM, the proposed scheme has some additional features like human intervention procedures, different token distribution method, homomorphic encryption etc. to enhance the security and solve the mentioned issues. To confirm the same, an experiment has been conducted to evaluate the performance and security measures of proposed scheme. Keywords: Vulnerability, Security, Confidentiality, Identity management system 1. Introduction Cloud computing has been defined by five essential characteristics given by the National Institute of Standard and Technology (NIST), elasticity, a large pool of resources, broad network access, self-service and measured services [1]. The main features which attract and drive adoption of cloud computing are a small cost of initial investment, low maintenance cost, independence of location and resource allocation and de-allocation according to the dynamic change in needs. Cloud computing provides an environment to store data and information of various clients. It provides an environment for remote data management, i.e. the data are maintained by third parties which challenge security concern. The data servers which are available on a cloud can also be prone to the attacks [2, 3, 4]. Therefore, it is important that only authorized users access the services of the cloud. For this, there is a need to maintain the access control system so that only authorized user can have the access towards the services of the cloud. Access controlling is gaining importance day-by-day in social networking applications where users store and share their personal and professional information, pictures, video etc. It is not only enough to store information securely but also making sure that it is accessed by valid and authorized users only. It is a responsibility of cloud system that information stored in the cloud is secure, i.e. it is stored in such a way that it cannot be hacked easily [4]. All these preferences are generally managed by a chosen cloud identity management system which Received (October 21, 2017), Review Result (December 19, 2017), Accepted (December 22, 2017)