IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cloud-Based Identity and Identity Meta-Data: Secure and Control of Data in Globalization Era

Cloud-Based Identity and Identity Meta-Data: Secure and Control of Data in Globalization Era
View Sample PDF
Author(s): Grzegorz Spyra (Edinburgh Napier University, UK), William J. Buchanan (Edinburgh Napier University, UK), Peter Cruickshank (Edinburgh Napier University, UK)and Elias Ekonomou (Edinburgh Napier University, UK)
Copyright: 2016
Pages: 18
Source title: Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-0159-6.ch076

Purchase

View Cloud-Based Identity and Identity Meta-Data: Secure and Control of Data in Globalization Era on the publisher's website for pricing and purchasing information.

Abstract

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store and process sensitive personal data. It introduces the new concepts of Compound Personal Record (CPR) and Compound Identifiable Data (CID) ontology, which aim to move toward own your own data model. The CID model ensures authenticity of identity meta-data; high availability via unified Cloud-hosted XML data structure; and privacy through encryption, obfuscation and anonymity applied to Ontology-based XML distributed content. Additionally CID via XML ontologies is enabled for identity federation. The paper also suggests that access over sensitive data should be strictly governed through an access control model with granular policy enforcement on the service side. This includes the involvement of relevant access control model entities, which are enabled to authorize an ad-hoc break-glass data access, which should give high accountability for data access attempts.

Related Content

Peter Arthur Barone. © 2023. 17 pages.
Patricia A. Goforth. © 2023. 22 pages.
Steven Lloyd Leeper. © 2023. 18 pages.
Neslihan Yayla. © 2023. 25 pages.
İlknur Gümüş. © 2023. 14 pages.
Sarah E. Daly. © 2023. 15 pages.
Yakup Alper Varış. © 2023. 22 pages.
Body Bottom