Management of Identity and Access in the Cloud
Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Anbar
2012-12-01
|
Series: | مجلة جامعة الانبار للعلوم الصرفة |
Subjects: | |
Online Access: | https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdf |
_version_ | 1827396217559056384 |
---|---|
author | Kashif Kifayat Sameeh Abdulghafour Jassim Sufyan T. Faraj |
author_facet | Kashif Kifayat Sameeh Abdulghafour Jassim Sufyan T. Faraj |
author_sort | Kashif Kifayat |
collection | DOAJ |
description | Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps. |
first_indexed | 2024-03-08T18:47:41Z |
format | Article |
id | doaj.art-1be4b477786c4711b3fc39a8b5462e5a |
institution | Directory Open Access Journal |
issn | 1991-8941 2706-6703 |
language | English |
last_indexed | 2024-03-08T18:47:41Z |
publishDate | 2012-12-01 |
publisher | University of Anbar |
record_format | Article |
series | مجلة جامعة الانبار للعلوم الصرفة |
spelling | doaj.art-1be4b477786c4711b3fc39a8b5462e5a2023-12-28T21:56:09ZengUniversity of Anbarمجلة جامعة الانبار للعلوم الصرفة1991-89412706-67032012-12-0162223310.37652/juaps.2012.6323463234Management of Identity and Access in the CloudKashif Kifayat0Sameeh Abdulghafour Jassim1Sufyan T. Faraj2LJMU-School of Comp. & Math.Liverpool, UKUniversity of Anbar - College of ComputerUniversity of Anbar - College of ComputerCloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps.https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdfaccess controlcloud computingcryptographyidentity and access managementsecurity |
spellingShingle | Kashif Kifayat Sameeh Abdulghafour Jassim Sufyan T. Faraj Management of Identity and Access in the Cloud مجلة جامعة الانبار للعلوم الصرفة access control cloud computing cryptography identity and access management security |
title | Management of Identity and Access in the Cloud |
title_full | Management of Identity and Access in the Cloud |
title_fullStr | Management of Identity and Access in the Cloud |
title_full_unstemmed | Management of Identity and Access in the Cloud |
title_short | Management of Identity and Access in the Cloud |
title_sort | management of identity and access in the cloud |
topic | access control cloud computing cryptography identity and access management security |
url | https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdf |
work_keys_str_mv | AT kashifkifayat managementofidentityandaccessinthecloud AT sameehabdulghafourjassim managementofidentityandaccessinthecloud AT sufyantfaraj managementofidentityandaccessinthecloud |