Content uploaded by Carlos Becker Westphall
Author content
All content in this area was uploaded by Carlos Becker Westphall on Oct 18, 2017
Content may be subject to copyright.
10/17/17, 11'21 PMCloud identity management: A survey on privacy strategies - ScienceDirect
Page 1 of 5http://www.sciencedirect.com/science/article/pii/S1389128617301664?via%3Dihub
Outline
Abstract
Keywords
1. Introduction
2. Privacy in identity management in the cloud
2.1. Identity management concepts
2.1.1. IdM Technologies
2.2. Cloud IdM challenges
2.3. Privacy challenges and characteristics
3. Privacy in cloud IdM models and techniques
3.1. Systematic mapping
3.2. IdM projects with privacy
3.3. Privacy proposals in the cloud
3.4. Privacy proposals in IdM
4. Challenges and directions for privacy-based IdM to cloud
4.1. Reliability assessment
4.2. Agreement of privacy options
4.3. Definition of interaction profiles
4.4. Grained control over the dissemination of data
4.5. Ensure the implementation of policies
5. Proposed solutions in progress
5.1. Sensitive data dissemination control
5.2. Privacy profiles on IdM
5.3. Dynamic registering with privacy
5.4. Model for IdM with privacy in cloud
6. Conclusion
Acknowledgment
References
Vitae
Outline
Purchase PDFPurchase
Export
Search ScienceDirect
Advanced
Journals Books Register Sign in
Register to receive personalized recommendationsRegister to receive personalized recommendations
based on your recent signed-in activitybased on your recent signed-in activity
×
Register now
10/17/17, 11'21 PMCloud identity management: A survey on privacy strategies - ScienceDirect
Page 2 of 5http://www.sciencedirect.com/science/article/pii/S1389128617301664?via%3Dihub
Hide outline
Figures (9)
Show all figures
Tables (3)
Table 1
Table 2
Table 3
Get rights and content
Computer Networks
Volume 122, 20 July 2017, Pages 29-42
Cloud identity management: A survey on privacy strategies
Jorge Werner , Carla Merkle Westphall, Carlos Becker Westphall
Show more
https://doi.org/10.1016/j.comnet.2017.04.030
Abstract
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing
applications and resources, the use of models and tools is essential for the secure
management of identities and to avoid compromising data privacy. There are models and
tools that address federated identity management, and it is important that they use privacy
10/17/17, 11'21 PMCloud identity management: A survey on privacy strategies - ScienceDirect
Page 3 of 5http://www.sciencedirect.com/science/article/pii/S1389128617301664?via%3Dihub
Check if you have access through your login credentials or your institution.
Check Access
or
Purchase
or
Check for this article elsewhere
mechanisms to assist in compliance with current legislation. Therefore, this article aims to
present a survey of privacy in cloud identity management, presenting and comparing main
features and challenges described in the literature. At the end of this work there is a
discussion of the use of privacy and future research directions.
Keywords
Privacy; Identity management; Cloud computing
Choose an option to locate/access this article:
Recommended articles Citing articles (0)
Vitae
Jorge Werner is doing his PhD degree in Computer Science at Federal University of Santa
10/17/17, 11'21 PMCloud identity management: A survey on privacy strategies - ScienceDirect
Page 4 of 5http://www.sciencedirect.com/science/article/pii/S1389128617301664?via%3Dihub
Catarina. He has received his Master in Computer Science from Federal University of Santa
Catarina (2011) and graduated from the Estacio de Sa University of Santa Catarina (2007)
as Computer Network Technology.
Carla M. Westphall is a professor in the Department of Informatics and Statistics at the
Federal University of Santa Catarina, Brazil. Her research interests include distributed
security, identity management, and grid and cloud security. Westphall received her PhD in
electrical engineering from the Federal University of Santa Catarina.
Carlos B. Westphall is a full professor in the Department of Informatics and Statistics at the
Federal University of Santa Catarina, where he is the leader of the Networks and
Management Laboratory. His research interests include network and service management,
security, and cloud computing. He received his D.Sc. in computer science at Paul Sabatier
University, France. He was the founder of LANOMS. In 2011 he was named an IARIA
Fellow. He has served as Technical Program and/or Organizing Committee member (since
1994) of IFIP/IEEE IM, IEEE/IFIP NOMS, IEEE/IFIP DSOM, IEEE LANOMS, and IEEE
APNOMS. He has been on the Board of Editors (since 1995) and Senior Technical Editor
(since 2003) of the Journal of Network and Systems Management of Springer and an
Editorial Board member (since 2004) of the Computer Networks Journal of Elsevier. He has
also been an Associate Editor (since 2006) of the Journal of Communication and Information
Systems of IEEE ComSoc/SBrT. Since 1993 he has been a member of IFIP TC6 Working
Group 6.6 (Management of Networks and Distributed Systems), and since 2003 a member
of the core team of the TeleManagementForum Universities Program (TMF UP). Since 2008
10/17/17, 11'21 PMCloud identity management: A survey on privacy strategies - ScienceDirect
Page 5 of 5http://www.sciencedirect.com/science/article/pii/S1389128617301664?via%3Dihub
he has been Latin America International Academy, Research, and Industry Association
(IARIA) Liaison Board Chair. He was a member (2004–2005 and 2006–2007) of the IEEE
ComSoc Membership Programs Development Board. From May 2000 to May 2005 he acted
as Secretary of the IEEE Committee on Network Operation and Management (CNOM).
From May 2005 to May 2009 he acted as Vice- Chair of IEEE CNOM. He has been a
member of IEEE CNOM since 1994.
© 2017 Elsevier B.V. All rights reserved.
A novel queue-length-based CSMA algorithm with improved delay characteristics
Computer Networks, Volume 122, 2017, pp. 56-69
Download PDF View details
Variable-weight topology-transparent scheduling
Computer Networks, Volume 122, 2017, pp. 16-28
Download PDF View details
FTRS: A mechanism for reducing flow table entries in software defined networks
Computer Networks, Volume 122, 2017, pp. 1-15
Download PDF View details
View more articles
Recommended articles
Citing articles (0)
About ScienceDirect Remote access Shopping cart
Contact and support Terms and conditions Privacy policy
Cookies are used by this site. For more information, visit the cookies
page.
Copyright © 2017 Elsevier B.V. or its licensors or contributors.
ScienceDirect ® is a registered trademark of Elsevier B.V.