Chord based identity management for e-healthcare cloud applications

Il Kon Kim, Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Citations (Scopus)

Abstract

Increase in healthcare awareness has raised the number of subscriptions for e-Healthcare applications. Consequently e-Healthcare application providers are adopting Cloud computing to handle immense processing load and to reduce service delivery cost. Identity management has been an issue which hinders in adoption of e-Healthcare applications, due to sensitivity of the data involved in it. Existing Cloud based e-Healthcare applications provide access to their services though Single-Sign-On (SSO) protocols. Traditional SSO uses asymmetric encryption, thus increasing the execution load on Cloud gateway and on Identity Provider as well. In this paper we propose a methodology of SSO for Cloud applications by utilizing Peer-to-Peer concepts to distribute processing load among computing nodes within Cloud. The proposed scheme, called Chord for Cloud (C4C), decreases the number of authentication request send to Identity Provider and disseminates the authentication process within the federated environment of Cloud, through Chord algorithm. The effectiveness of the proposed technique has been shown through argumentation scenarios.
Original languageEnglish
Title of host publication2010 10th Annual Symposium on Applications and the Internet
PublisherIEEE
ISBN (Electronic)9781424475278
ISBN (Print) 9781424475261
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 10th IEEE/IPSJ International Symposium on Applications and the Internet - Seoul, Korea, Republic of
Duration: 19 Jul 201023 Jul 2010

Conference

Conference2010 10th IEEE/IPSJ International Symposium on Applications and the Internet
Abbreviated titleSAINT
Country/TerritoryKorea, Republic of
CitySeoul
Period19/07/1023/07/10

Keywords

  • clouds
  • authentication
  • medical services
  • cloud computing
  • encryption
  • peer to peer computing
  • fingers

Fingerprint

Dive into the research topics of 'Chord based identity management for e-healthcare cloud applications'. Together they form a unique fingerprint.

Cite this