Protection of Identity Information in Cloud Computing without Trusted Third Party

  title={Protection of Identity Information in Cloud Computing without Trusted Third Party},
  author={Rohit Ranchal and Bharat K. Bhargava and Lotfi Ben Othmane and Leszek Lilien and Anya Kim and Myong H. Kang and Mark Linderman},
  journal={2010 29th IEEE Symposium on Reliable Distributed Systems},
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity… CONTINUE READING
Highly Cited
This paper has 82 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 48 extracted citations

82 Citations

Citations per Year
Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 13 references

““Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing,”

  • R. Gellman
  • World Privacy Forum,
  • 2009
Highly Influential
10 Excerpts

Hebdom, ““PRIME - Privacy and Identity Management for Europe,”

  • S. Fischer-Hubner
  • Online at:…
  • 2010
2 Excerpts

““Identity Web blog,”

  • K. Cameron
  • Online at:
  • 2010
1 Excerpt

““Cloud Computing Identity Management,”

  • A. Gopalakrishnan
  • SETLabs Briefings,
  • 2009
1 Excerpt

““Proposal for a Common Identity Framework: A user-Centric Identity Metasystem,”

  • K. Cameron
  • Online at:
  • 2009

Similar Papers

Loading similar papers…