Download presentation
Presentation is loading. Please wait.
1
Hybrid Cloud Federated Identity Solutions Supporting Public Sector First Responders
Literature Survey Venn Diagram e.g. First Responder, Hybrid Cloud, Federated Identity Randy E. Garcia University of Colorado at Colorado Springs May
2
Research Motivation Public Sector first responders require resilient, secure, and dynamic solutions for cross- organizational collaboration Current solutions are cumbersome and limit effectiveness of response to limited-notice events Time required to establish service limits response effectiveness Related research addresses components of the three areas: Public Sector Hybrid Cloud Federated Identity This research expands on the above and composes a holistic solution to increase effectiveness
3
Federated Identity First Responders Hybrid Cloud Survey
4
Highly centralized (use of master Public Key Generator)
[1] Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Contributions Challenges related to research topic Federated identity with hierarchical identity based cryptography for mutual authentication and key distribution Captures security and privacy as key issues in cloud computing Simplifies key distribution and mutual authentication in a hybrid cloud Identity-based cryptographic solutions contrary to public sector policies and de facto solutions Highly centralized (use of master Public Key Generator) This paper proposes to use federated identity management in the cloud such that each user and each server will have its own unique identity, and the identity is allocated by the system hierarchically. Liang Yan, Chunming Rong, Gansen Zhao Cloud Computing, 2009
5
Leverages prevalence of SAML
[2] Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics Contributions Challenges related to research topic Hybrid Cloud internal/external single sign on (SSO) via Security Assertion Markup Language Federated identity management multifactor authentication including biometrics Leverages prevalence of SAML Relies on multimodal biometric catalog of users a priori Primary application is secure hybrid cloud federation vice mobility SAML is a very mature, standards based technology and should be foundational to any B. Prasanalakshmi, A. Kannammal International Journal of Computer Applications (0975 – 8887) Volume 53– No.18, September 2012
6
[3] Security and Cloud Computing: InterCloud Identity Management Infrastructure
Contributions Challenges related to research topic Distributed cloud information sharing framework with federated identity as a foundation Introduces concepts in cloud computing and security, focusing on heterogeneous and federated scenarios Employs “home cloud” and “foreign cloud” concepts counter to standard cloud frameworks Very cursory architectural discussion with no implementation results Requires broad trust agreements which may not be practical Proposes third party IdM not palatable to public sector Antonio Celesti, Francesco Tusa, Massimo Villari and Antonio Puliafito 2010 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (IEEE)
7
[4] Establishing trust in cloud computing
Contributions Challenges related to research topic Discusses trust issues and technologies to solve cloud computing security concerns Captures policy and human factors Primarily a catalog of issues and approaches KM Khan, Q Malluhi IT professional, 2010
8
[5] Cloud Computing Security - Trends and Research Directions
Contributions Challenges related to research topic Provides a framework and methodology for assessing cloud security issues. Helps organizations adopt cloud computing. Sets conditions of success and roadmap for most cloud security considerations to include identity and access control. Provides a framework but no specific solutions. Researchers plan to develop detailed framework and tools to aid migration to the cloud. Shubhashis Sengupta, Vikrant Kaulgud, Vibhu Saujanya Sharma, Accenture 2011 IEEE World Congress on Services
9
[6] National Authentication Framework Implementation Study
Contributions Challenges related to research topic Details and compares various token types and identity frameworks (PKI, SAML, WS-F, OpenID, and Infocard) Recommends best combination of technologies, protocols, and standards Less focused on cloud solution sets Presses authentication standards versus federation Mok Chuan-Hao 2009 NPS Thesis
10
[7] Addressing cloud computing security issues
Contributions Challenges related to research topic Identifies cloud security requirements Proposes a Trusted Third Party which assures specific security characteristics in a cloud environment Proposes PKI solution which interfaces with SSO and LDAP Applies standard systems engineering processes Trusted Third Party concept not palatable to Government Cloud Adds layer of third party PKI to an already complex architecture Future Generation Computing Systems 28 (2012), Trusted Third Party (TTP) is an entity which facilitates secure interactions between two parties who both trust this third party. Dimitrios Zissis, Dimitrios Lekkas 2012 Future Generation Computing Systems
11
Proposed Approach and Tasks
Develop proposed architecture Develop private and public (community) cloud sites Propose federated identity solutions Evaluate capabilities (against cloud model), resilience (against user need), and cybersecurity suitability
12
Candidate Dr. Chuan Yue Dr. Edward Chow Dr. Jia Rao
13
Way Ahead Concurrence with survey
Guidance on research scope related to federated identity, hybrid cloud, and the first responder use case Focus on security Request approval by June to initiate research phases and request funding from federal government sponsors
14
Comprehensive Examination The purpose of the comprehensive examination is to ensure that the student possesses the following: Sufficient grasp of the fundamentals of the chosen dissertation area to begin research, normally achieved through a thorough study of the current literature on the topic Ability to conduct innovative research Ability to exchange ideas and information with members of the Advisory Committee
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.