SlideShare a Scribd company logo
1 of 15
Trust Assessment for Cloud Identity Providers
Using Analytical Hierarchy Process
Brian Cusack
Eghbal Ghazi Zadeh
Objective
• Develop a trust management framework for cloud
identity customers that:
– Aggregates, manages and measures trust-related
information
– Attributes, Characteristics, Metrics, Secure elements
– From different sources which are available and relevant
while assessing the trustworthiness of a cloud identity
providers
2
Cloud Computing
3
• XaaS (Anything as a Service)
• TaaS (Trust as a Service)
• IDaaS (Identity as a Service)
Cloud Computing
• Every cloud service has a method of managing
identities that may address some of challenges but a
user requires to know the trust that may be put in
the service.
• The techniques and methods used can be measured
by the trust measurement system to help a user to
make a good decision
4
Cloud Identity Management System
• OAuth
• SAML
• Windows CardSpace, Info Card
• Higgins
• U-Prove
• Identity Mixer (Idemix)
• OpenID
• OpenID Connect
5
OpenID Connect Workflow
6
Auth Server
Auth Server
Auth Server
Auth Server
Auth Server
Auth Server
Cloud Service Provider
Cloud Identity Provider
Cloud Identity User
Trust Framework
Problem Statement
• Between CIdPs and CIdUs, what are the
Essential System Characteristics (ESC) of the
published trust establishment methods?
• Prioritizing characteristics and attributes
• Multi-Criteria Decision Making (MCDM)
• Analytical Hierarchy Process (AHP)
7
Service Trust Evaluation System Architecture
8
AHP
9
• AHP approach is one of the more extensively
used MCDM methods.
• decomposition, or the hierarchy construction.
• comparative judgments, or defining and
executing data collection to obtain pairwise
comparison data on elements of the
hierarchical structure.
• synthesis of priorities, or constructing an
overall priority rating.
ESC OF CLOUD IDENTITY PROVIDERS
• Balancing
• Single sign-on
• Lifecycle
• Privacy
• Risk
• Standards
10
Hierarchy of CIdP Decision Making
11
Weights for Main Characteristics
12
AHP Result for Standard
13
Conclusion
• Selecting a trustable and Secure CIdP is
essential
• Users require trust information
• Selection of a CIdPs as an MCDM problem
• Critical criteria affecting the decision making
• Theoretical three level AHP model
•
14
Thank you
15

More Related Content

What's hot

DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!
DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!
DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!PatrickBadley
 
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and SolutionsWSO2
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns WSO2
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecturehamsa nandhini
 
Vulture next filtering engine
Vulture next filtering engineVulture next filtering engine
Vulture next filtering engineAdvens
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorWSO2
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active DirectoryZoho Corporation
 
Soa 20 steps to soa governance
Soa 20 steps to soa governanceSoa 20 steps to soa governance
Soa 20 steps to soa governanceVaibhav Khanna
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICEForgeRock
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in GovernmentWSO2
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryControlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryZoho Corporation
 
Enterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insightEnterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insightJana Lass
 
[WSO2Con EU 2018] Decentralized Data Architectures
[WSO2Con EU 2018] Decentralized Data Architectures[WSO2Con EU 2018] Decentralized Data Architectures
[WSO2Con EU 2018] Decentralized Data ArchitecturesWSO2
 
The Planet Corporate Overview Short Version 07 17 09
The Planet Corporate Overview Short Version 07 17 09The Planet Corporate Overview Short Version 07 17 09
The Planet Corporate Overview Short Version 07 17 09pbarbour
 
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native CompanionJakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native CompanionJakarta_EE
 
A Complete BI Solution in About an Hour!
A Complete BI Solution in About an Hour!A Complete BI Solution in About an Hour!
A Complete BI Solution in About an Hour!Aaron King
 
X-Road as a Platform to Exchange MyData
X-Road as a Platform to Exchange MyDataX-Road as a Platform to Exchange MyData
X-Road as a Platform to Exchange MyDataPetteri Kivimäki
 

What's hot (20)

DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!
DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!
DevelOP Your Kubernetes Cluster wGitOps, Helm, Docker, Flux, Charts, Git!
 
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions
[WSO2Con EU 2017] WSO2 Unleashed: Full Stack Automation, Pitfalls and Solutions
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
 
BAS big data_v1 0
BAS big data_v1 0BAS big data_v1 0
BAS big data_v1 0
 
Vulture next filtering engine
Vulture next filtering engineVulture next filtering engine
Vulture next filtering engine
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
 
Soa 20 steps to soa governance
Soa 20 steps to soa governanceSoa 20 steps to soa governance
Soa 20 steps to soa governance
 
Power BI: Tips and Tricks
Power BI: Tips and TricksPower BI: Tips and Tricks
Power BI: Tips and Tricks
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Analytics and etl based bi solutions
Analytics and etl based bi solutionsAnalytics and etl based bi solutions
Analytics and etl based bi solutions
 
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
[WSO2Con EU 2017] Implementing Data Exchange Infrastructure in Government
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryControlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active Directory
 
Enterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insightEnterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insight
 
[WSO2Con EU 2018] Decentralized Data Architectures
[WSO2Con EU 2018] Decentralized Data Architectures[WSO2Con EU 2018] Decentralized Data Architectures
[WSO2Con EU 2018] Decentralized Data Architectures
 
The Planet Corporate Overview Short Version 07 17 09
The Planet Corporate Overview Short Version 07 17 09The Planet Corporate Overview Short Version 07 17 09
The Planet Corporate Overview Short Version 07 17 09
 
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native CompanionJakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
 
A Complete BI Solution in About an Hour!
A Complete BI Solution in About an Hour!A Complete BI Solution in About an Hour!
A Complete BI Solution in About an Hour!
 
X-Road as a Platform to Exchange MyData
X-Road as a Platform to Exchange MyDataX-Road as a Platform to Exchange MyData
X-Road as a Platform to Exchange MyData
 

Similar to Trust assessment 2017 for cloud identity providers using analytical hierarchical process

Hybrid cloud: the best way to do the third way
Hybrid cloud: the best way to do the third wayHybrid cloud: the best way to do the third way
Hybrid cloud: the best way to do the third wayCloud Credential Council
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxnada542773
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiVasu Surabhi
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud SecurityRightScale
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
The Benefits and Coverage of CloudMASTER Cloud Computing Classes
The Benefits and Coverage of CloudMASTER Cloud Computing ClassesThe Benefits and Coverage of CloudMASTER Cloud Computing Classes
The Benefits and Coverage of CloudMASTER Cloud Computing ClassesCarver Technology Consulting LLC
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be PreparedAlan Eardley
 
Ics training catalogue
Ics training catalogueIcs training catalogue
Ics training catalogueK R Vaghela
 
Myths of validation
Myths of validationMyths of validation
Myths of validationJeff Thomas
 
The Path to Broker Cloud Services
The Path to Broker Cloud ServicesThe Path to Broker Cloud Services
The Path to Broker Cloud ServicesRightScale
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awarenesswlammert
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 

Similar to Trust assessment 2017 for cloud identity providers using analytical hierarchical process (20)

Hybrid cloud: the best way to do the third way
Hybrid cloud: the best way to do the third wayHybrid cloud: the best way to do the third way
Hybrid cloud: the best way to do the third way
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
CloudBiometrics_Intel (1)
CloudBiometrics_Intel (1)CloudBiometrics_Intel (1)
CloudBiometrics_Intel (1)
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Csa dlp
Csa dlpCsa dlp
Csa dlp
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Choosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePointChoosing and Using Cloud Services with SharePoint
Choosing and Using Cloud Services with SharePoint
 
The Benefits and Coverage of CloudMASTER Cloud Computing Classes
The Benefits and Coverage of CloudMASTER Cloud Computing ClassesThe Benefits and Coverage of CloudMASTER Cloud Computing Classes
The Benefits and Coverage of CloudMASTER Cloud Computing Classes
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be Prepared
 
Ics training catalogue
Ics training catalogueIcs training catalogue
Ics training catalogue
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 
The Path to Broker Cloud Services
The Path to Broker Cloud ServicesThe Path to Broker Cloud Services
The Path to Broker Cloud Services
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awareness
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 

Recently uploaded

male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 

Recently uploaded (20)

male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 

Trust assessment 2017 for cloud identity providers using analytical hierarchical process

  • 1. Trust Assessment for Cloud Identity Providers Using Analytical Hierarchy Process Brian Cusack Eghbal Ghazi Zadeh
  • 2. Objective • Develop a trust management framework for cloud identity customers that: – Aggregates, manages and measures trust-related information – Attributes, Characteristics, Metrics, Secure elements – From different sources which are available and relevant while assessing the trustworthiness of a cloud identity providers 2
  • 3. Cloud Computing 3 • XaaS (Anything as a Service) • TaaS (Trust as a Service) • IDaaS (Identity as a Service)
  • 4. Cloud Computing • Every cloud service has a method of managing identities that may address some of challenges but a user requires to know the trust that may be put in the service. • The techniques and methods used can be measured by the trust measurement system to help a user to make a good decision 4
  • 5. Cloud Identity Management System • OAuth • SAML • Windows CardSpace, Info Card • Higgins • U-Prove • Identity Mixer (Idemix) • OpenID • OpenID Connect 5
  • 6. OpenID Connect Workflow 6 Auth Server Auth Server Auth Server Auth Server Auth Server Auth Server Cloud Service Provider Cloud Identity Provider Cloud Identity User Trust Framework
  • 7. Problem Statement • Between CIdPs and CIdUs, what are the Essential System Characteristics (ESC) of the published trust establishment methods? • Prioritizing characteristics and attributes • Multi-Criteria Decision Making (MCDM) • Analytical Hierarchy Process (AHP) 7
  • 8. Service Trust Evaluation System Architecture 8
  • 9. AHP 9 • AHP approach is one of the more extensively used MCDM methods. • decomposition, or the hierarchy construction. • comparative judgments, or defining and executing data collection to obtain pairwise comparison data on elements of the hierarchical structure. • synthesis of priorities, or constructing an overall priority rating.
  • 10. ESC OF CLOUD IDENTITY PROVIDERS • Balancing • Single sign-on • Lifecycle • Privacy • Risk • Standards 10
  • 11. Hierarchy of CIdP Decision Making 11
  • 12. Weights for Main Characteristics 12
  • 13. AHP Result for Standard 13
  • 14. Conclusion • Selecting a trustable and Secure CIdP is essential • Users require trust information • Selection of a CIdPs as an MCDM problem • Critical criteria affecting the decision making • Theoretical three level AHP model • 14

Editor's Notes

  1. Cloud entities: This component is responsible for interaction with customers and understanding their application needs. It performs discovery and ranking of services using other components such as trust management, direct/indirect trust, and evaluation methods. Monitoring and history information: This component discovers services that can satisfy user requirements, then it closely monitors the trust performance of the service. The related history records are stored in the service database for access and reference. Computing service network structure and catalogue: This component builds the network structure and the features advertised by the various different providers. The computing resources are divided into different classes to satisfy demand distribution.
  2. Cloud entities: This component is responsible for interaction with customers and understanding their application needs. It performs discovery and ranking of services using other components such as trust management, direct/indirect trust, and evaluation methods. Monitoring and history information: This component discovers services that can satisfy user requirements, then it closely monitors the trust performance of the service. The related history records are stored in the service database for access and reference. Computing service network structure and catalogue: This component builds the network structure and the features advertised by the various different providers. The computing resources are divided into different classes to satisfy demand distribution.