International Journal of Future Generation Communication and Networking
Vol. 11, No. 1 (2018), pp.23-36
http://dx.doi.org/10.14257/ijfgcn.2018.11.1.03
ISSN: 2233-7857 IJFGCN
Copyright © 2018 SERSC Australia
Secured Identity Management System for Preserving Data
Privacy and Transmission in Cloud Computing
1
Garima Rastogi
1*
and Rama Sushil
2
1*
Computer Science and Engineering Department, DIT University, Dehradun
INDIA
2
Department of Information Technology, DIT University, Dehradun INDIA
garimaverma.research@gmail.com
ramasushil@yahoo.co.in
Abstract
In this era of globalization, cloud computing is being preferred for management and
maintenance of data and services across sectors such as health, banking, manufacturing,
national security services etc. Therefore, it becomes extremely important to make ample
provision for data confidentiality and privacy. In short, data security is a very important
issue which needs to be addressed properly to enhance the usage of cloud computing. In
this manuscript, some vulnerability issues have been identified in the conventional
identity management (IDM) systems that are used currently. This paper proposes a novel
identity management system for secure data transmission and preserving data privacy in
cloud environment called (SIDM). The proposed system will overcomes issues such as
network traffic interception, IDM compromise and replay attack. In comparison to
general IDM, the proposed scheme has some additional features like human intervention
procedures, different token distribution method, homomorphic encryption etc. to enhance
the security and solve the mentioned issues. To confirm the same, an experiment has been
conducted to evaluate the performance and security measures of proposed scheme.
Keywords: Vulnerability, Security, Confidentiality, Identity management system
1. Introduction
Cloud computing has been defined by five essential characteristics given by the
National Institute of Standard and Technology (NIST), elasticity, a large pool of
resources, broad network access, self-service and measured services [1]. The main
features which attract and drive adoption of cloud computing are a small cost of initial
investment, low maintenance cost, independence of location and resource allocation and
de-allocation according to the dynamic change in needs. Cloud computing provides an
environment to store data and information of various clients. It provides an environment
for remote data management, i.e. the data are maintained by third parties which challenge
security concern. The data servers which are available on a cloud can also be prone to the
attacks [2, 3, 4]. Therefore, it is important that only authorized users access the services of
the cloud. For this, there is a need to maintain the access control system so that only
authorized user can have the access towards the services of the cloud. Access controlling
is gaining importance day-by-day in social networking applications where users store and
share their personal and professional information, pictures, video etc. It is not only
enough to store information securely but also making sure that it is accessed by valid and
authorized users only. It is a responsibility of cloud system that information stored in the
cloud is secure, i.e. it is stored in such a way that it cannot be hacked easily [4]. All these
preferences are generally managed by a chosen cloud identity management system which
Received (October 21, 2017), Review Result (December 19, 2017), Accepted (December 22, 2017)