Defence Mechanism for Access Management in Cloud Computing
DOI:
https://doi.org/10.32628/CSEIT206124Keywords:
Cloud Computing, Security, Privacy, IAM, Compliance, Audit, Multi-Factor Authentication.Abstract
Cloud computing is a modern approach of distributed computing which provides different kinds of on-demand services for the business organization as well as individual users. It provides a platform to adopt information Technology and its features without huge expenditure on infrastructure and applications. However, cloud computing provides various types of services as per the requirement of the user and business is popular for But due to the increasing utility of cloud computing now, it also has many possibilities of various types of network attacks and privacy violations. However, the identity and access management are used to manage all the services including multi-tenancy and third party infrastructure based services provided by the cloud computing technology. In this paper, the issues related to authentication, access management in cloud computing environment are explained along with the proposed framework to reduce the problem in access management in the cloud computing.
References
- P. Mell and T. Grance, “The NIST definition of cloud computing,” 2011
- F. Gens, “New IDC IT cloud services survey: top benefits and challenges,” 2009.
- A. Murphy, “Storing data in the cloud raises compliance challenges,” 2012.
- S. Lee, I. Ong, H. T. Lim, H. J. Lee, Two factor authentication for cloud computing, International Journal of KIMICS, vol 8, Pp. 427-432-33
- SecaaS Implementation Guidance Category 1 Identity and Access Management. Cloud Security Alliance, pp. 43, 2012.
- Abdul Ghafoor, MisbahIrum, Muhammad Qaisar, "User Centric Access Control Policy Management Framework for Cloud Applications", 2013
- RizwanaShaikh, M. Sasikumar , “ Identity Management in CloudComputing ”, International Journal of Computer Applications (0975- 8887) Volume 63-No.11, February 2013
- A. Josang and S. Pope. User Centric Identity Management, In Proc. AusCERT, Gold Coast, May 2005.
- S.Subashini, V. Kavitha;"A survey on security issues in service delivery models of cloud computing";Journal of Network and Com
- Yan Yang; Xingyuan Chen; Guangxia Wang; Lifeng Cao, "An Identity and Access Management Architecture in Cloud," in Computational Intelligence and Design (ISCID), 2014
- H. Saevanee, N. Clarke, S. Furnell, V. Biscione, Continuous user authentication using multi-modal biometrics, Comput. Secur. 53 (2015) 234–246
- D. Shlomi, “Privileged identity management: Securing the enterprise Network,” Security, vol. 2010, issue 12, pp. 4-6, December 2010.
- S. Travis, “Identity in the cloud, computer,” Fraud & Security, issue 7, pp. 19-20, July 2012.
- U. Habiba, R. Masood, M.A. Shibli, M.A. Niazi, Cloud identity managementsecurity issues & solutions: a taxonomy, Complex Adapt. Syst. Model. 2 (2014)
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.