Affiliation:
1. Cisco Systems, Inc., USA
2. InfoBeyond Technology LLC, USA
Abstract
Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.
Reference31 articles.
1. Ahn, G., Ko, M., & Shehab, M. (2009). Privacy-enhanced user-centric identity management. In Proceedings of the IEEE International Conference on Communications (ICC'09). IEEE.
2. Ahn, H., Chang, H., Jang, C., & Choi, E. (2011). User authentication platform using provisioning in cloud computing environment. Advanced Communication and Networking Communications in Computer and Information Science, 132-138.
3. Amazon S3. (2013). Retrieved from http://aws.amazon.com/s3
4. Privacy-preserving digital identity management for cloud computing.;E.Bertino;IEEE Computer Society Data Engineering Bulletin,2009
5. Chow, R., et al. (2010). Authentication in the clouds: A framework and its application to mobile users. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW '10). Chicago: ACM.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cloud Computing Security;SpringerBriefs in Electrical and Computer Engineering;2014