Asian Journal of Computer Science and Technology (AJCST)
The Federation, Presence between the Cloud Service Providers and Privacy in the CloudAuthor : K. Kusuma, S. Kokila, V. Bhagyasree and K. Rohitha
Volume 8 No.3 Special Issue:June 2019 pp 170-175
The advancement of pay-per-use services of cloud is changing the environment for identity management because most of the identity paradigms are concentrating on the enterprises and erect restrictive, controlled and static environment. Now we are migrating in to new environment with updated versions, where services of cloud offered on-demand and continuously assessment to meet the user expectations. Previous creations are being challenged with these innovations. For example, trust assumptions, implications of privacy and aspects of authentication and authorization are considered old. This paper presents the aspects of federation, communication and privacy in the cloud era to create new opportunities and to meet the business challenges.
Cloud Federation, Presence, XMPP, Privacy
 Peter Saint-Andre, “XEP-0238: XMPP Protocol Flows for Inter Domain Federation,” [Online] Available: http://xmpp.org/exten sions/xep-0238.html, Retrieved 1 Mar 2009.
 [Online] Available: http://msdn.microsoft.com/en-us/security/aa570 351.aspx.
 [Online] Available: http://xmpp.org/extentions/xep-0220.html, Retrieved 28 Feb. 2009
 [Online] Available: http://en.wikipedia.org/wiki/information_privacy, Retrieved 28 Feb. 2009.
 [Online] Available: http://en.wikipedia.org/wiki/personally_identifia ble_information, Retrieved 28 Feb. 2009.
 [Online] Available: http://www.truste.org/about/press_release/12_15 _08.php, Retrieved 28 Feb. 2009.
 [Online] Available: http://www.ftc.gov/bcp/edu/pubs/business/idtheft. pdf, Retrieved 27 Feb. 2009.
 [Online] Available: http://www.worldprivacyforum.org/pdf/wpf_ cloud_privacy_report.pdf, 23 Feb. 2009.
 [CIO10a] Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies, CIO Council, Privacy Committee, Web 2.0/Cloud Computing Subcommittee, August 2010, [Online] Available: http://www.cio.gov/Documents/PrivacyRecomm endations-Cloud-Computing-8-19-2010.docx>.
 [CIO10b] Federal Enterprise Architecture Security and Privacy Profile, Version 3, September 30, 2010, [Online] Available: http://www.cio.gov/Documents/FEA-Security-Privacy-Profile-v309-30-2010.pdf>.
 [Online] Available: https://books.google.co.in/books/about/cloud-computing.html?id=YRleASgVUJoc.federation presence identity in the cloud books.
 [Online] Available: http://ieexplore.ieee.org/iel7/7027114/7027326/ 07027557.pdf.
 [Online] Available: www.ijste.org/articles/IJSTEVll1019.pdf.
 [Online] Available: http://www.knowledgenet.com/it-training/courses/clod-computing-fundamentals-identity-presence-and-privacy.
 [Online] Available: www.iosrjournals.orglisr-jce/papers/Vol.19-issue6/version-1/f1906013440.pdf.