Affiliation:
1. National Institute of Technology Karnataka, India
Abstract
Nowadays, the issue of identity and access management (IAM) has become an important research topic in cloud computing. In the distributed computing environments like cloud computing, effective authentication and authorization are essential to make sure that unauthorized users do not access the resources, thereby ensuring the confidentiality, integrity, and availability of information hosted in the cloud environment. In this chapter, the authors discuss the issue of identity and access management in cloud computing, analyzing the work carried out by others in the area. Also, various issues in the current IAM scenario in cloud computing, such as authentication, authorization, access control models, identity life cycle management, cloud identity-as-a-service, federated identity management and also, the identity and access management in the inter-cloud environment are discussed. The authors conclude this chapter discussing a few research issues in the area of identity and access management in the cloud and inter-cloud environments.
Reference64 articles.
1. Almulla, S. A., & Yeun, C. Y. (2010, March). Cloud computing security management. Proceedings of the 2010 Second International Conference on Engineering Systems Management and Its Applications (ICESMA) (pp. 1-7). IEEE.
2. Amazon Web Services-Identity and Access Management. (2015). Retrieved from http://aws.amazon.com/iam
3. Amazon Web Services-Multi Factor Authentication. (2015). Retrieved from http://aws.amazon.com/mfa
4. Microsoft Azure. (2015). Retrieved from http://azure.microsoft.com/en- in/documentation/infographics/cloud-identity-and-access/
5. Bernstein, D., & Vij, D. (2010a, July). Intercloud directory and exchange protocol detail using XMPP and RDF. Proceedings of the 2010 6th World Congress on Services (SERVICES-1) (pp. 431-438). IEEE.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献