Towards the Adoption of Secure Cloud Identity Services

Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Enhancing trust among service providers and end-users with respect to data protection is an urgent ma.er in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end confidentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key benefits as convincing arguments.

Original languageEnglish
Title of host publicationARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security
PublisherAssociation of Computing Machinery
Pages1–7
VolumePart F130521
ISBN (Electronic)978-1-4503-5257-4
DOIs
Publication statusPublished - 29 Aug 2017
Event12th International Conference on Availability, Reliability and Security: ARES 2017 - Reggio Calabria, Italy
Duration: 29 Aug 20171 Sept 2017

Conference

Conference12th International Conference on Availability, Reliability and Security
Country/TerritoryItaly
CityReggio Calabria
Period29/08/171/09/17

Keywords

  • Access control
  • Data sharing
  • Identity management
  • Proxy re-encryption
  • User adoption

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint

Dive into the research topics of 'Towards the Adoption of Secure Cloud Identity Services'. Together they form a unique fingerprint.

Cite this