CFP last date
20 May 2024
Reseach Article

An Efficient Model for Securing Identity Access in Scalable System

by Sunil Singh, Manish Kumar, Shantanu Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 5
Year of Publication: 2013
Authors: Sunil Singh, Manish Kumar, Shantanu Das
10.5120/11959-7793

Sunil Singh, Manish Kumar, Shantanu Das . An Efficient Model for Securing Identity Access in Scalable System. International Journal of Computer Applications. 70, 5 ( May 2013), 26-30. DOI=10.5120/11959-7793

@article{ 10.5120/11959-7793,
author = { Sunil Singh, Manish Kumar, Shantanu Das },
title = { An Efficient Model for Securing Identity Access in Scalable System },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 5 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number5/11959-7793/ },
doi = { 10.5120/11959-7793 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:04.698555+05:30
%A Sunil Singh
%A Manish Kumar
%A Shantanu Das
%T An Efficient Model for Securing Identity Access in Scalable System
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 5
%P 26-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database. The proposed model uses the distributed database technology for information storage and retrieval to make the system more reliable. The IDs information storage is secured by using cryptography mechanism of data conversion in the identity database. Authenticated link by internet service providers is used for secure communication of the user information between the authenticated service agencies/ user service providers and the Identity server. For retrieval of the user sensitive information, this paper proposes an access method based on request and authorization of the service provider.

References
  1. Uwe Glasser, Vajihollahi Mona. Identity Management Architecture. IEEE, June 17-20, 2008, Taipei, Taiwan 1-4244-2415-3/2008.
  2. Meng-Ju Hsieh, Chao-Rui Chang, Li-Yung Ho, Jan-Jan Wu, and Pangfeng Liu. SQLMR: A Scalable Database Management System for Cloud Computing. International Conference on Parallel Processing, 2011.
  3. Vishal Gupta and Ashutosh Saxena. Personalized Data Set. IJDMS Vol. 2, No. 4, November 2010.
  4. Surajit Chaudhuri, Raghav Kaushik and Ravi Ramamurthy. Database Access Control & Privacy: Is There A Common Ground? 5th Biennial Conference on Innovative Data Systems Re-search (CIDR '11) January 9-12, 2011.
  5. M Johnson I Agbinya, Nazia Mastali, Rumana Islam and Jackson Phiri. Design and Implementation of Multimodal Digital Identity Management System Using Finger print Matching and Face Recognition. 6th International Conference on Broadband Communications & Biomedical Applications, November 21 - 24, 2011.
  6. Alan R. Downing, Ira B. Greenberg and Teresa F. Lunt. Issues in distributed database security. IEEE, TH0287-3/90/0000/0196 Q 1990.
  7. Chiung-Shien Wu, Gin-Kou Ma, and Mei-Chian Liu. A scalable storage supporting multistream real-time data retrieval. Springer-Verlag, Multimedia Systems 7, pp. 458–466, 1999.
  8. David Mowers and Michel Baladi, "Microsoft Solutions for Security and Compliance," Microsoft Corporation, Sci. Rep. 85, 2006. http://technet. microsoft. com/en-us/library/cc162924.
  9. Alvaro J. Gutierrez, Professor Joan Feigenbaum. Towards Better Digital Identity Management. Sensitive Information in a Wired World CPSC 457b - Spring 2006.
  10. The Role of Digital Identity Management in the Internet Economy: A Primer for Policy Makers. http://www. oecd. org/dataoecd/55/48/43091476. pdf.
  11. The Next-Generation Secure Computing Base (NGSCB). http://en. wikipedia. org/wiki/Next-Generation_Secure_Computing_Base.
  12. The trusted computing base (TCB). http://en. wikipedia. org/wiki/Trusted_computing_base.
  13. Unique Identification Authority of India. (2012). Aadhaar Enabled Service Delivery [White paper]. http://uidai. gov. in/images/authDoc/whitepaper_aadhaarenabledservice_delivery. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Digital Identity Identity Server Data Privacy Authenticating Service Agency Service Provider