Abstract
The purpose of this study is to identify the potential security and privacy issues for the entities providing cloud identity services known as cloud identity providers. We document the key security and privacy issues and problems that arise when users and service providers co-operate for cloud service utility. The Delphi method is adopted to facilitate identifying the security and privacy issues in the cloud identity environment. The benefit of using the Delphi method is identification of the issues and prioritizing the relative importance of these issues. A four-round modified Delphi process was applied to a general database of security literature, and then the most relevant articles selected for further analysis. The analysis highlights key issues, advantages and disadvantages of the identity and access management methods; and, risk mitigation mechanisms for identity theft.
Recommended Citation
Cusack, Brian and Ghazizadeh, Eghbal, "Defining cloud identity security and privacy issues: A Delphi method" (2019). AMCIS 2019 Proceedings. 12.
https://aisel.aisnet.org/amcis2019/info_security_privacy/info_security_privacy/12
Defining cloud identity security and privacy issues: A Delphi method
The purpose of this study is to identify the potential security and privacy issues for the entities providing cloud identity services known as cloud identity providers. We document the key security and privacy issues and problems that arise when users and service providers co-operate for cloud service utility. The Delphi method is adopted to facilitate identifying the security and privacy issues in the cloud identity environment. The benefit of using the Delphi method is identification of the issues and prioritizing the relative importance of these issues. A four-round modified Delphi process was applied to a general database of security literature, and then the most relevant articles selected for further analysis. The analysis highlights key issues, advantages and disadvantages of the identity and access management methods; and, risk mitigation mechanisms for identity theft.