Defence Mechanism for Access Management in Cloud Computing

Authors

  • Dr. Abid Hussain  Assistant Professor, School of Computer Applications, Career Point University, Kota, Rajasthan, India
  • Dr. Praveen Kumar Sharma  Vardhman Mahaveer Open University, Kota, Rajasthan, India

DOI:

https://doi.org//10.32628/CSEIT206124

Keywords:

Cloud Computing, Security, Privacy, IAM, Compliance, Audit, Multi-Factor Authentication.

Abstract

Cloud computing is a modern approach of distributed computing which provides different kinds of on-demand services for the business organization as well as individual users. It provides a platform to adopt information Technology and its features without huge expenditure on infrastructure and applications. However, cloud computing provides various types of services as per the requirement of the user and business is popular for But due to the increasing utility of cloud computing now, it also has many possibilities of various types of network attacks and privacy violations. However, the identity and access management are used to manage all the services including multi-tenancy and third party infrastructure based services provided by the cloud computing technology. In this paper, the issues related to authentication, access management in cloud computing environment are explained along with the proposed framework to reduce the problem in access management in the cloud computing.

References

  1. P. Mell and T. Grance, “The NIST definition of cloud computing,” 2011
  2. F. Gens, “New IDC IT cloud services survey: top benefits and challenges,” 2009.
  3. A. Murphy, “Storing data in the cloud raises compliance challenges,” 2012.
  4. S. Lee, I. Ong, H. T. Lim, H. J. Lee, Two factor authentication for cloud computing, International Journal of KIMICS, vol 8, Pp. 427-432-33
  5. SecaaS Implementation Guidance Category 1 Identity and Access Management. Cloud Security Alliance, pp. 43, 2012.
  6. Abdul Ghafoor, MisbahIrum, Muhammad Qaisar, "User Centric Access Control Policy Management Framework for Cloud Applications", 2013
  7. RizwanaShaikh, M. Sasikumar , “ Identity Management in CloudComputing ”, International Journal of Computer Applications (0975- 8887) Volume 63-No.11, February 2013
  8. A. Josang and S. Pope. User Centric Identity Management, In Proc. AusCERT, Gold Coast, May 2005.
  9. S.Subashini, V. Kavitha;"A survey on security issues in service delivery models of cloud computing";Journal of Network and Com
  10. Yan Yang; Xingyuan Chen; Guangxia Wang; Lifeng Cao, "An Identity and Access Management Architecture in Cloud," in Computational Intelligence and Design (ISCID), 2014
  11. H. Saevanee, N. Clarke, S. Furnell, V. Biscione, Continuous user authentication using multi-modal biometrics, Comput. Secur. 53 (2015) 234–246
  12. D. Shlomi, “Privileged identity management: Securing the enterprise Network,” Security, vol. 2010, issue 12, pp. 4-6, December 2010.
  13. S. Travis, “Identity in the cloud, computer,” Fraud & Security, issue 7, pp. 19-20, July 2012.
  14. U. Habiba, R. Masood, M.A. Shibli, M.A. Niazi, Cloud identity managementsecurity issues & solutions: a taxonomy, Complex Adapt. Syst. Model. 2 (2014)

Downloads

Published

2020-02-29

Issue

Section

Research Articles

How to Cite

[1]
Dr. Abid Hussain, Dr. Praveen Kumar Sharma, " Defence Mechanism for Access Management in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 1, pp.137-143, January-February-2020. Available at doi : https://doi.org/10.32628/CSEIT206124