Chord based identity management for e-healthcare cloud applications

Il Kon Kim, Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Increase in healthcare awareness has raised the number of subscriptions for e-Healthcare applications. Consequently e-Healthcare application providers are adopting Cloud computing to handle immense processing load and to reduce service delivery cost. Identity management has been an issue which hinders in adoption of e-Healthcare applications, due to sensitivity of the data involved in it. Existing Cloud based e-Healthcare applications provide access to their services though Single-Sign-On (SSO) protocols. Traditional SSO uses asymmetric encryption, thus increasing the execution load on Cloud gateway and on Identity Provider as well. In this paper we propose a methodology of SSO for Cloud applications by utilizing Peer-to-Peer concepts to distribute processing load among computing nodes within Cloud. The proposed scheme, called Chord for Cloud (C4C), decreases the number of authentication request send to Identity Provider and disseminates the authentication process within the federated environment of Cloud, through Chord algorithm. The effectiveness of the proposed technique has been shown through argumentation scenarios.
Original languageEnglish
Title of host publication2010 10th Annual Symposium on Applications and the Internet
PublisherIEEE
ISBN (Electronic)9781424475278
ISBN (Print) 9781424475261
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 10th IEEE/IPSJ International Symposium on Applications and the Internet - Seoul, Korea, Republic of
Duration: 19 Jul 201023 Jul 2010

Conference

Conference2010 10th IEEE/IPSJ International Symposium on Applications and the Internet
Abbreviated titleSAINT
CountryKorea, Republic of
CitySeoul
Period19/07/1023/07/10

    Fingerprint

Keywords

  • clouds
  • authentication
  • medical services
  • cloud computing
  • encryption
  • peer to peer computing
  • fingers

Cite this

Kim, I. K., Pervez, Z., Masood Khattak, A., & Lee, S. L. (2010). Chord based identity management for e-healthcare cloud applications. In 2010 10th Annual Symposium on Applications and the Internet IEEE. https://doi.org/10.1109/SAINT.2010.68