Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Transparent Identity and Access Management as Managed Security Service from Clouds

Deepak H. Sharma, C A. Dhote, Manish M. Potey Published in Security

IJAIS Proceedings on International Conference on Communication Computing and Virtualization
Year of Publication: 2016
© 2015 by IJAIS Journal
Download full text
  1. Deepak H Sharma, C A Dhote and Manish M Potey. Article: Transparent Identity and Access Management as Managed Security Service from Clouds. IJAIS Proceedings on International Conference on Communication Computing and Virtualization ICCCV 2016(2):25-28, July 2016. BibTeX

    @article{key:article,
    	author = "Deepak H. Sharma and C A. Dhote and Manish M. Potey",
    	title = "Article: Transparent Identity and Access Management as Managed Security Service from Clouds",
    	journal = "IJAIS Proceedings on International Conference on Communication Computing and Virtualization",
    	year = 2016,
    	volume = "ICCCV 2016",
    	number = 2,
    	pages = "25-28",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

In managed security model the focus is on security provided as cloud service; i. e. security delivered through the cloud instead of on-premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and granting correct level of access for resources which are protected in the cloud environment. The IAM implemented as managed cloud service can benefit the user with all the advantages offered by Security-as-a-service model (SECaaS). This paper discusses implementation of a proof-of-concept (POC) of transparent managed IAM service. This prototype has been also evaluated. The relevant technologies are discussed for providing secure access to cloud users.

Reference

  1. Shuai Zhang, Shufen Zhang, Xuebin Chen, XiuzhenHuo, "Cloud Computing Research and Development Trend", 2010 Second International Conference on Future Networks, IEEE 2010
  2. Nicholas Carr,"The Big Switch Rewiring the world from Edison to Google", W. W. Norton & Co. January 2008
  3. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1, http://www. cloudsecurityalliance. org/, December 2009.
  4. Cloud Security Alliance, SecaaS Defined categories of service 2011
  5. CSA SecaaS Implementation guide : Identity and Access Management September 2012
  6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 336.
  7. Samlinson, E. ; Usha, M. , "User-centric trust based identity as a service for federated cloud environment," in Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol. , no. , pp. 1-5, 4-6 July 2013
  8. Yan Yang; Xingyuan Chen; Guangxia Wang; Lifeng Cao, "An Identity and Access Management Architecture in Cloud," in Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, vol. 2, no. , pp. 200-203, 13-14 Dec. 2014
  9. Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010
  10. Deepak Sharma, Dr. C A. Dhote, Manish Potey, "Security-as-a-Service from clouds : A survey" IIJC Vol 1 Issue 4, October 2011
  11. Deepak Sharma, Dr. C A. Dhote, Manish Potey, "Security-as-a-Service from Clouds: A comprehensive Analysis?, IJCA Volume 67-Number 3, April 2013

Keywords

Managed Security Service, Security-as-a-service.