Identity and Access Management in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the model supplying the dynamic management of the user’s identity federation was introduced. With the implementation of multi-agent systems and the decision making solutions the identity federation dynamization was ensured.Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. Proper Identity Management may be seen as the first step towards accessing any kind of service from the clouds. It’s a person’s identity which authorizes him and gives rights to access some data or application in the cloud. Hence Identity theft is perceived as a severe problem and may have disastrous consequences. This paper reviews the trends and approachestaken towards a better Identity management in Cloud computing for a more secure cloud environment.
Authors and Affiliations
Sonam Sudha, Ms. Vasudha Arora
Using Internet of Things for Home Applications
By implementing IoT along with a home automated system, which monitors the sensor data, like temperature, gas, light, motion sensors, and also actuates a process according to the requirement. For example turning the lig...
Seismic Analysis of a Multistorey RC Building for Various Lateral Load Resisting Systems by Response Spectrum Method
The current work deals with analysis of Multi-storey RC building for earthquake effects that develops lateral loads on buildings by Response spectrum method. In this method, peak acceleration for an earthquake is acted...
Implementation on- Crowd Wisdom Management
Many online users with different backgrounds commonly use mobile social networking i.e. connect with one another through their different devices like PC, mobiles, tablet that can be use for purpose of crowdsourcing. As...
Bare PCB Inspection and Sorting System
This paper proposes a bare PCB inspection system using image analysis wherein the inspection algorithm mainly focuses on the defect detection and finding the exact location of the defect using the real PCB images. In th...
Design Optimization and Analysis of Shear Wall in High Rise Buildings Using ETABS
The shear wall is a structural element which is used to resist earthquake forces. These wall will consumptives shear forces & will prevent changing location-position of construction & consequently destruction. On other...