Content uploaded by Carlos Becker Westphall
Author content
All content in this area was uploaded by Carlos Becker Westphall on Mar 10, 2014
Content may be subject to copyright.
3/10/14 2:07 PMInderscience Publishers
Page 1 of 1http://www.inderscience.com/info/inarticle.php?artid=59328
Help Sitemap
LOG IN
For Authors, Editors, Board Members
Username
••••••••
Int. J. of Security and Networks > 2014 Vol.9, No.1 > pp.1 - 11
Title: Privacy-preserving identity federations in the cloud: a proof of concept
Author: Daniel Ricardo Dos Santos; Tiago Jaime Nascimento; Carla Merkle Westphall; Marcos Aurélio
Pedroso Leandro; Carlos Becker Westphall
Address: Networks and Management Laboratory, Department of Informatics and Statistics, Federal
University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management
Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis,
SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics,
Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management
Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis,
SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics,
Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil
Journal: Int. J. of Security and Networks, 2014 Vol.9, No.1, pp.1 - 11
Abstract: Because of the growth in the use of cloud computing and the migration of services to this
paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity
and Access Management is among these issues and is related to the management of users and access
to their data. Federated Identity Management is widely adopted in the cloud to provide useful features to
identity management systems, but maintaining user privacy in those systems is still a challenge. This
paper describes the implementation of a privacy-preserving identity federation in the cloud. Our
motivation was to develop a proof of concept, in order to elucidate the identity federation setup of
Shibboleth and the handling of private attributes performed by uApprove in a cloud computing
environment. The paper shows a description of the deployment of the identity and service providers,
their integration and a detailed analysis of the scenario.
Keywords: cloud computing; privacy preservation; identity federations; shibboleth; federated identity
management; access management; cloud security.
DOI: 10.1504/IJSN.2014.059328
10.1504/14.59328
Purchase this article Comment on this article
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Join us on Google+
Our Newsletter (subscribe)
RSS Feeds
New issue alerts
Publishers of distinguished academic, scientific and professional journals
Article search
Go
Contact us | About Inderscience | OAI Repository | Privacy and Cookies Statement | Terms and Conditions | © 2014 Inderscience Enterprises Ltd.
Remember me Forgotten?
Home For Authors Orders News