Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 260187, 17 pages
http://dx.doi.org/10.1155/2014/260187
Research Article

Trusted Computing Strengthens Cloud Authentication

1Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
2MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia

Received 28 September 2013; Accepted 19 December 2013; Published 18 February 2014

Academic Editors: J. Shu and F. Yu

Copyright © 2014 Eghbal Ghazizadeh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Mell and T. Grance, “The NIST definition of cloud computing (draft),” NIST Special Publication, vol. 800, p. 145, 2011. View at Google Scholar
  2. A. Earls, “Gartner takes on cloud identity management,” 2012, http://searchsoa.techtarget.com/tip/Gartner-takes-on-cloud-identity-management.
  3. U. F. Rodriguez, M. Laurent-Maknavicius, and J. Incera-Dieguez, Federated Identity Architectures, 2006.
  4. I. M. Abbadi and A. Martin, “Trust in the cloud,” Information Security Technical Report, vol. 16, no. 3-4, pp. 108–114, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Carmignani, Identity Federation Using SAML and WebSphere Software, 2010.
  6. TCG, “Trusted computing,” 2012, http://www.trustedcomputinggroup.org/trusted_computing.
  7. L. Yan, C. Rong, and G. Zhao, “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography,” Cloud Computing, pp. 167–177, 2009. View at Google Scholar
  8. S.-T. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey, and K. Beznosov, “What makes users refuse web single sign-on?: an empirical investigation of OpenID,” in Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS '11), p. 4, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Wang, An Analysis of Web Single Sign-on, 2011.
  10. H. Hodges, Johansson, and Morgan, Towards Kerberizing Web Identity and Services, Kerberos Consortium, 2008.
  11. A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra, “Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps,” in Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE '08), pp. 1–9, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Wang and Q. Shao, “Analysis of cloud computing and information security,” in Proceedings of the 2nd International Conference on Frontiers of Manufacturing and Design Science (ICFMD '11), pp. 3810–3813, Taichung, Taiwan, December 2011.
  13. P. Madsen, Y. Koga, and K. Takahashi, “Federated identity management for protecting users from ID theft,” in Proceedings of the Workshop on Digital Identity Management, pp. 77–83, 2005.
  14. J. H. You and M. S. Jun, “A mechanism to prevent RP phishing in OpenID system,” in Proceedings of the IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS '10), pp. 876–880, 2010.
  15. X. Ding and J. Wei, “A scheme for confidentiality protection of OpenID authentication mechanism,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '10), pp. 310–314, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. F. B. Mat Nor, K. Abd Jalil, and J.-L. Ab Manan, “Remote user authentication scheme with hardware-based attestation,” Communications in Computer and Information Science, vol. 180, no. 2, pp. 437–447, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, “A billion keys, but few locks: the crisis of web single sign-on,” in Proceedings of the New Security Paradigms Workshop (NSPW '10), pp. 61–71, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. K. A. J. Fazli Bin Mat Nor and J. l. Ab Manan, “Mitigating man-in-the-browser attacks with Hardware-based authentication scheme,” International Journal of Cyber-Security and Digital Forensics, vol. 1, no. 3, p. 6, 2012. View at Google Scholar
  19. C. Latze and U. Ultes-Nitsche, “Stronger authentication in e-commerce: how to protect even Naïve user against Phishing, pharming, and MITM attacks,” in Proceedings of the International Association of Science and Technology for Development (IASTED '07), pp. 111–116, October 2007. View at Scopus
  20. P. Urien, “An OpenID provider based on SSL smart cards,” in Proceedings of the 7th IEEE Consumer Communications and Networking Conference (CCNC '10), pp. 1–2, Las Vegas, Nev, USA, 2010.
  21. H. Khiabani, J.-L. A. Manan, and Z. M. Sidek, “A study of trust & privacy models in pervasive computing approach to trusted computing platforms,” in Proceedings of the International Conference for Technical Postgraduates (TECHPOS '09), pp. 1–5, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Ferg, OpenID Authentication 2. 0-Final, OpenID Community, 2007.
  23. M. Donovan and E. Visnyak, “Seeding the cloud with trust: real world trusted multi-tenancy use cases emerge,” 2011, http://www.ittoday.info/Articles/Trust/Trust.htm.
  24. P. Cooke, “Black Hat TPM Hack and BitLocker,” 2010, http://blogs.windows.com/windows/b/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and-bitlocker.aspx.