Identity and Access Management in Cloud Computing

Abstract

In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the model supplying the dynamic management of the user’s identity federation was introduced. With the implementation of multi-agent systems and the decision making solutions the identity federation dynamization was ensured.Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. Proper Identity Management may be seen as the first step towards accessing any kind of service from the clouds. It’s a person’s identity which authorizes him and gives rights to access some data or application in the cloud. Hence Identity theft is perceived as a severe problem and may have disastrous consequences. This paper reviews the trends and approachestaken towards a better Identity management in Cloud computing for a more secure cloud environment.

Authors and Affiliations

Sonam Sudha, Ms. Vasudha Arora

Keywords

Related Articles

RAAR Processor: The Digital Image Processor

Image processing have wide applications in the day to day life of humans in one or the other applications like Surveillance, multimedia applications, medicine, automobiles, authentication systems etc. The research in th...

Autonomous Obstacle Detection and Tracking System

The most challenging domain in intelligent vehicle operation is collision avoidance. In case of extremities drivers show a great tendency to break vehicle than to steer although steering could be a better move. Automati...

This Novel Realize New Electronic Capsule

This work will speak to the confront to smooth the progress of the development of a high capacity radio system for a small, miniaturized electronic pill device that can be saleable or implantable in human body in order...

Experimental Study of Recycled Aggregate Concrete

In this paper work we are discussing about the use of recycled concrete aggregate in the concrete and the effects on its compressive strength by progressively replacing the natural concrete aggregate (NCA) with recycled...

Sleeping Driver Detection along with Safety Measures

Our main motive is to make a project based on a system that will help driver to stay alert on the road as well as drive or handle the vehicle only in the conscious state i.e. will be able to driver only when the person...

Download PDF file
  • EP ID EP18407
  • DOI -
  • Views 259
  • Downloads 16

How To Cite

Sonam Sudha, Ms. Vasudha Arora (2014). Identity and Access Management in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(7), -. https://europub.co.uk/articles/-A-18407