CFP last date
15 May 2024
Reseach Article

Transparent Identity and Access Management as Managed Security Service from Clouds

Published on July 2016 by Deepak H. Sharma, C A. Dhote, Manish M. Potey
International Conference on Communication Computing and Virtualization
Foundation of Computer Science USA
ICCCV2016 - Number 2
July 2016
Authors: Deepak H. Sharma, C A. Dhote, Manish M. Potey
456974e5-a7b5-4e1e-afa0-52eb07918134

Deepak H. Sharma, C A. Dhote, Manish M. Potey . Transparent Identity and Access Management as Managed Security Service from Clouds. International Conference on Communication Computing and Virtualization. ICCCV2016, 2 (July 2016), 0-0.

@article{
author = { Deepak H. Sharma, C A. Dhote, Manish M. Potey },
title = { Transparent Identity and Access Management as Managed Security Service from Clouds },
journal = { International Conference on Communication Computing and Virtualization },
issue_date = { July 2016 },
volume = { ICCCV2016 },
number = { 2 },
month = { July },
year = { 2016 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icccv2016/number2/921-1665/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Computing and Virtualization
%A Deepak H. Sharma
%A C A. Dhote
%A Manish M. Potey
%T Transparent Identity and Access Management as Managed Security Service from Clouds
%J International Conference on Communication Computing and Virtualization
%@ 2249-0868
%V ICCCV2016
%N 2
%P 0-0
%D 2016
%I International Journal of Applied Information Systems
Abstract

In managed security model the focus is on security provided as cloud service; i. e. security delivered through the cloud instead of on-premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and granting correct level of access for resources which are protected in the cloud environment. The IAM implemented as managed cloud service can benefit the user with all the advantages offered by Security-as-a-service model (SECaaS). This paper discusses implementation of a proof-of-concept (POC) of transparent managed IAM service. This prototype has been also evaluated. The relevant technologies are discussed for providing secure access to cloud users.

References
  1. Shuai Zhang, Shufen Zhang, Xuebin Chen, XiuzhenHuo, "Cloud Computing Research and Development Trend", 2010 Second International Conference on Future Networks, IEEE 2010
  2. Nicholas Carr,"The Big Switch Rewiring the world from Edison to Google", W. W. Norton & Co. January 2008
  3. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1, http://www. cloudsecurityalliance. org/, December 2009.
  4. Cloud Security Alliance, SecaaS Defined categories of service 2011
  5. CSA SecaaS Implementation guide : Identity and Access Management September 2012
  6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 336.
  7. Samlinson, E. ; Usha, M. , "User-centric trust based identity as a service for federated cloud environment," in Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol. , no. , pp. 1-5, 4-6 July 2013
  8. Yan Yang; Xingyuan Chen; Guangxia Wang; Lifeng Cao, "An Identity and Access Management Architecture in Cloud," in Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, vol. 2, no. , pp. 200-203, 13-14 Dec. 2014
  9. Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010
  10. Deepak Sharma, Dr. C A. Dhote, Manish Potey, "Security-as-a-Service from clouds : A survey" IIJC Vol 1 Issue 4, October 2011
  11. Deepak Sharma, Dr. C A. Dhote, Manish Potey, "Security-as-a-Service from Clouds: A comprehensive Analysis?, IJCA Volume 67-Number 3, April 2013
Index Terms

Computer Science
Information Sciences

Keywords

Managed Security Service Security-as-a-service.