Protection of Identity Information in Cloud Computing Without Trusted Third Party

Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of "Users" represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple Service Providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss.

Provided by: Purdue University Topic: Cloud Date Added: Aug 2010 Format: PDF

Find By Topic