Identity and Access Management in Cloud Computing

Abstract

In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the model supplying the dynamic management of the user’s identity federation was introduced. With the implementation of multi-agent systems and the decision making solutions the identity federation dynamization was ensured.Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. Proper Identity Management may be seen as the first step towards accessing any kind of service from the clouds. It’s a person’s identity which authorizes him and gives rights to access some data or application in the cloud. Hence Identity theft is perceived as a severe problem and may have disastrous consequences. This paper reviews the trends and approachestaken towards a better Identity management in Cloud computing for a more secure cloud environment.

Authors and Affiliations

Sonam Sudha, Ms. Vasudha Arora

Keywords

Related Articles

Using Internet of Things for Home Applications

By implementing IoT along with a home automated system, which monitors the sensor data, like temperature, gas, light, motion sensors, and also actuates a process according to the requirement. For example turning the lig...

Seismic Analysis of a Multistorey RC Building for Various Lateral Load Resisting Systems by Response Spectrum Method

The current work deals with analysis of Multi-storey RC building for earthquake effects that develops lateral loads on buildings by Response spectrum method. In this method, peak acceleration for an earthquake is acted...

Implementation on- Crowd Wisdom Management

Many online users with different backgrounds commonly use mobile social networking i.e. connect with one another through their different devices like PC, mobiles, tablet that can be use for purpose of crowdsourcing. As...

Bare PCB Inspection and Sorting System

This paper proposes a bare PCB inspection system using image analysis wherein the inspection algorithm mainly focuses on the defect detection and finding the exact location of the defect using the real PCB images. In th...

Design Optimization and Analysis of Shear Wall in High Rise Buildings Using ETABS

The shear wall is a structural element which is used to resist earthquake forces. These wall will consumptives shear forces & will prevent changing location-position of construction & consequently destruction. On other...

Download PDF file
  • EP ID EP18407
  • DOI -
  • Views 276
  • Downloads 16

How To Cite

Sonam Sudha, Ms. Vasudha Arora (2014). Identity and Access Management in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(7), -. https://europub.co.uk/articles/-A-18407