Identity and Access Management in Cloud Computing

Abstract

In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the model supplying the dynamic management of the user’s identity federation was introduced. With the implementation of multi-agent systems and the decision making solutions the identity federation dynamization was ensured.Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. Proper Identity Management may be seen as the first step towards accessing any kind of service from the clouds. It’s a person’s identity which authorizes him and gives rights to access some data or application in the cloud. Hence Identity theft is perceived as a severe problem and may have disastrous consequences. This paper reviews the trends and approachestaken towards a better Identity management in Cloud computing for a more secure cloud environment.

Authors and Affiliations

Sonam Sudha, Ms. Vasudha Arora

Keywords

Related Articles

slug(Peak to Average Power Ratio) Reduction Techniques in OFDM(Orthogonal Frequency Division Multiplexing) System

Communication is one of the important aspects of life. For better transmission, even single – carrier waves are being replaced by multi – carriers. Multi – carrier systems like CDMA and OFDM are now – a – days being imp...

Simulation of Speed Control of Brushless DC Motor for four Quadrant Operation

Brushless DC (BLDC) motor drives are becoming more popular in industrial, traction applications. This makes the control of BLDC motor in all the four quadrants very vital. This paper deals with the conventional control...

Mathematical Based Model on Survivability for WDM Networks

Survivability is a new field of research, and is viewed by many as distinct from the traditional areas of security and fault-tolerance. Survivability is the ability of any system to continuously withstand its adequate p...

Modernizing ATM Security with Biometrics by Using LabVIEW

In today’s world the usage of currencies is moving towards virtual money. One of the at most important things that helped in making the transition towards virtual cash has been Automated Teller Machine (ATM). In order t...

Grocery Automated Booking System

Going to a grocery store and buying goods is a part of life. At present people don't have enough time to go and shop in a crowded super market. An alternate approach is to make things virtual with the help of GRocery Au...

Download PDF file
  • EP ID EP18407
  • DOI -
  • Views 293
  • Downloads 16

How To Cite

Sonam Sudha, Ms. Vasudha Arora (2014). Identity and Access Management in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(7), -. https://europub.co.uk/articles/-A-18407