A Model Apporach for Identity and Access Management (IAM) System in the Cloud
Creators
- 1. Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.
Contributors
Contact person:
Researchers:
- 1. Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.
- 2. Department of Information Technology, AKGEC, Ghaziabad (U.P.), India.
Description
Abstract: Through use of cloud computing, information may be accessible from a range of different types of devices. It is now possible to communicate with a company at any time or location, regardless of location or time zone. Using the cloud has a number of advantages, some of which include lower expenditures on information technology and infrastructure expenses, more agility, and improved continuity planning. These benefits can only be attained via the implementation of a reliable identity and access control system for cloud applications and services. Managing these identities and limiting the access that cloud clients and applications have continues to be a significant challenge in the modern day. In order to strengthen the protection offered by a venture, it is necessary to set up a trust worthy identity and access management (IAM) system in the cloud. The findings of this study provide an intelligent and reliable IAM system that is based on cloud computing.
Files
D364514040924.pdf
Files
(555.6 kB)
Name | Size | Download all |
---|---|---|
md5:e7a102345f59328c7e37708bba0040ae
|
555.6 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijsce.D3645.13060124
- EISSN
- 2231-2307
Dates
- Accepted
-
2024-01-15Manuscript received on 02 January 2024 | Revised Manuscript received on 10 January 2024 | Manuscript Accepted on 15 January 2024 | Manuscript published on 30 January 2024.
References
- Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2022). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics (Switzerland), 11(1), 1–34. https://doi.org/10.3390/electronics1101001https://doi.org/10.3390/elect ronics11010016
- Andi, H. K. (2021). Analysis of Serverless Computing Techniques in Cloud Software Framework. Journal of ISMAC, 3(3), 221–234. https://doi.org/10.36548/jismac.2021.3.004 https://doi.org/10.36548/jismac.2021.3.004
- de Almeida, M. G., & Canedo, E. D. (2022). Authentication and Authorization in Microservices Architecture: A Systematic Literature Review. Applied Sciences (Switzerland), 12(6). https://doi.org/10.3390/app12063023https://doi.org/10.3390/app12063023
- Editors, L., Yasuda, K., Lodderstedt, T., Nakamura, K., & Vercammen, J. (2022). OpenID for Verifiable Credentials. https://doi.org/10.1145/3442381.3450085
- Liu, G., Gao, X., & Wang, H. (2021). An investigation of identity-account inconsistency in single sign-on. The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021, April 2021, 105–117. https://doi.org/10.1145/3442381.3450085
- Mohammed, I. A. (2021). Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled. August. www.ijcrt.org
- Partida, A., Criado, R., & Romance, M. (2021). Identity and access management resilience against intentional risk for blockchain-based IOT platforms. Electronics (Switzerland), 10(4), 1–26. https://doi.org/10.3390/electronics10040378https://doi.org/10.3390/electronics10040378
- Programme, D., Electrical, I. N., & Engineering, A. (2022). Regulations in Identity and Access Management.
- Shankar, T. N., Rakesh, P., Bhargawa Rao, T., Hari Bharadwaj, L., Rakesh, C., & Lakshmi Madhuri, M. (2021). Providing security to land record with the computation of iris, blockchain, and one time password. Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 226–231. https://doi.org/10.1109/ICCCIS51004.2021.9397176https://doi.org/10.1109/ICCCIS51004.2021.9397176
- Slamet, C., Syaripudin, U., Kaffah, F. M., & Tiasto, B. E. (2021). Implementation of Rivest Cypher 4 algorithm in Security Assertion Mark-up Language protocols on Single Sign-On services. IOP Conference Series: Materials Science and Engineering, 1098(3), 032109. https://doi.org/10.1088/1757-899x/1098/3/032109https://doi.org/10.1088/1757-899X/1098/3/032109
- Wu, L., Cai, H. J., & Li, H. (2021). SGX-UAM: A secure unified access management scheme with one time passwords via intel SGX. IEEE Access, 9(March 2012), 38029–38042. https://doi.org/10.1109/ACCESS.2021.3063770. https://doi.org/10.1109/ACCESS.2021.3063770
- Almulla, S. A., & Yeun, C. Y. (2010). Cloud computing security management. In 2010 Second International Conference on Engineering System Management and Applications (pp. 1-7). IEEE.
- Mukundrao, J.A. and Vikram, G.P., 2011. Enhancing security in cloud computing. In Information and Knowledge Management (Vol. 1, No. 1, pp. 40-44).
- Zahoor, E., Asma, Z. and Perrin, O., 2017. A formal approach for the verification of AWS IAM access control policies. In Service-Oriented and Cloud Computing: 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings 6 (pp. 59-74). Springer International Publishing. https://doi.org/10.1007/978-3-319-67262-5_5
- Goyal, Ms. P., & Deora, Dr. S. S. (2022). Reliability of Trust Management Systems in Cloud Computing. In Indian Journal of Cryptography and Network Security (Vol. 2, Issue 1, pp. 1–5). https://doi.org/10.54105/ijcns.c1417.051322https://doi.org/10.54105/ijcns.C1417.051322
- Karthiga, S., & Velmurugan, Dr. T. (2020). Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 912–920). https://doi.org/10.35940/ijitee.d1363.029420 https://doi.org/10.35940/ijitee.D1363.029420
- Mishra, J. P., Panda, S. R., Mishra, S. K., & Pati, B. (2019). A Novel Observation on Cloud Computing in Education. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 5262–5274). https://doi.org/10.35940/ijrte.c5910.098319 https://doi.org/10.35940/ijitee.D1363.029420
- Radhamani, V., & Dalin, G. (2019). Significance of Artificial Intelligence and Machine Learning Techniques in Smart Cloud Computing: A Review. In International Journal of Soft Computing and Engineering (Vol. 9, Issue 3, pp. 1–7). https://doi.org/10.35940/ijsce.c3265.099319 https://doi.org/10.35940/ijrte.C5910.098319
- Kumar, Y. K., & Shafi, Dr. R. M. (2019). Key Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1, pp. 7220–7225). https://doi.org/10.35940/ijeat.a9995.109119 https://doi.org/10.35940/ijeat.A9995.109119