Zagazig University Digital Repository
Home
Thesis & Publications
All Contents
Publications
Thesis
Graduation Projects
Research Area
Research Area Reports
Search by Research Area
Universities Thesis
ACADEMIC Links
ACADEMIC RESEARCH
Zagazig University Authors
Africa Research Statistics
Google Scholar
Research Gate
Researcher ID
CrossRef
An identity management scheme for cloud computing: Review, challenges, and future directions
Faculty
Computer Science
Year:
2023
Type of Publication:
ZU Hosted
Pages:
Authors:
Asmaa Hanafy Ali Ghoniem
Staff Zu Site
Abstract In Staff Site
Journal:
Journal of Intelligent & Fuzzy Systems Sage Journals
Volume:
45
Keywords :
, identity management scheme , cloud computing: Review,
Abstract:
Cloud computing is a cost-effective way for organizations to access and use IT resources. However, it also exposes data to security threats. Authentication and authorization are crucial components of access control that prevent unauthorized access to cloud services. Organizations are turning to identity management solutions to help IT administrators face and mitigate security concerns. Identity management (IDM) has been recognized as a more robust solution for validating and maintaining digital identities. Identity management (IDM) is a key security mechanism for cloud computing that helps to ensure that only authorized users have access to data and resources. Traditional IDM solutions are centralized and rely on a single authority to manage user identities, which makes them vulnerable to attack. However, existing identity management solutions need to be more secure and trustworthy. Blockchain technology can create a more secure and trustworthy cloud transaction environment. Purpose: This paper investigates the security and trustworthiness of existing identity management solutions in cloud computing. Comparative results: We compared 14 traditional IDM schemes in cloud systems to explore contributions and limitations. This paper also compared 17 centralized, decentralized, and federated IDM models to explain their functions, roles, performance, contribution, primary metrics, and target attacks. About 17 IDM models have also been compared to explore their efficiency, overhead consumption, effectiveness to malicious users, trustworthiness, throughput, and privacy. Major conclusions: Blockchain technology has the potential to make cloud transactions more secure and reliable. It featured strong authentication and authorization mechanisms based on smart contracts on the Ethereum platform. As a result, it is still regarded as a reliable and immutable solution for protecting data sharing between entities in peer-to-peer networks. However, there is still a large gap between the theoretical method and its practical application. This paper also helps other scholars in the field discover issues and solutions and make suggestions for future research
Author Related Publications
Asmaa Hanafy Ali Ghoniem, "HYBRID E-GOVERNMENT FRAMEWORK BASED ON CLOUD COMPUTING AND SERVICE ORIENTED ARCHITECTURE", jatit, 2018
More
Asmaa Hanafy Ali Ghoniem, "E-government Adoption in Egypt: Analysis, Challenges and Prospects", ijett, 2017
More
Asmaa Hanafy Ali Ghoniem, "A Novel Method for Banknote Recognition Using a Combined Histogram of Oriented Gradients and Scale-Invariant Feature Transform", Natural Sciences, 2023
More
Asmaa Hanafy Ali Ghoniem, "Banknote Recognition for Visually Impaired Using Key-point and Support Vector Machine", ٌٍُESRG, 2022
More
Asmaa Hanafy Ali Ghoniem, "High-Precision Brain Tumor Diagnosis Using SECNN-MNet Framework and Explainable AI", Springer Nature, 2025
More
Department Related Publications
Abdelnaser Hessien Reyad Zaied , "A Technique for Cost Justified Software Usability Testing", Engineering Research Journal, Helwan University,, 2002
More
Abdelnaser Hessien Reyad Zaied , "Assessing e-Readiness in the Arab Countries: Perceptions Towards ICT Environment in Public Organizations in the State of Kuwait", Electronic Journal of e-Government, 2007
More
Abdelnaser Hessien Reyad Zaied , "Development of Driver Assistance Collision Avoidance Fuzzy System", Emirates Journal for Engineering Research, 2006
More
Amira Mohammed Fawzi AbedulFatah, "DATA MINING TECHNIQUES FOR DATABASE PREDICTION: STARTING POINT.", Journal of Theoretical and Applied Information Technology, 2018
More
Khalid Aly Eldrandaly Mohamed Saeed Eldrandaly, "A Model for Measuring Geographic Information Systems Success", Scientific Research Publishing, 2015
More
جامعة المنصورة
جامعة الاسكندرية
جامعة القاهرة
جامعة سوهاج
جامعة الفيوم
جامعة بنها
جامعة دمياط
جامعة بورسعيد
جامعة حلوان
جامعة السويس
شراقوة
جامعة المنيا
جامعة دمنهور
جامعة المنوفية
جامعة أسوان
جامعة جنوب الوادى
جامعة قناة السويس
جامعة عين شمس
جامعة أسيوط
جامعة كفر الشيخ
جامعة السادات
جامعة طنطا
جامعة بنى سويف