Management of Identity and Access in the Cloud

Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for...

Full description

Bibliographic Details
Main Authors: Kashif Kifayat, Sameeh Abdulghafour Jassim, Sufyan T. Faraj
Format: Article
Language:English
Published: University of Anbar 2012-12-01
Series:مجلة جامعة الانبار للعلوم الصرفة
Subjects:
Online Access:https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdf
_version_ 1827396217559056384
author Kashif Kifayat
Sameeh Abdulghafour Jassim
Sufyan T. Faraj
author_facet Kashif Kifayat
Sameeh Abdulghafour Jassim
Sufyan T. Faraj
author_sort Kashif Kifayat
collection DOAJ
description Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps.
first_indexed 2024-03-08T18:47:41Z
format Article
id doaj.art-1be4b477786c4711b3fc39a8b5462e5a
institution Directory Open Access Journal
issn 1991-8941
2706-6703
language English
last_indexed 2024-03-08T18:47:41Z
publishDate 2012-12-01
publisher University of Anbar
record_format Article
series مجلة جامعة الانبار للعلوم الصرفة
spelling doaj.art-1be4b477786c4711b3fc39a8b5462e5a2023-12-28T21:56:09ZengUniversity of Anbarمجلة جامعة الانبار للعلوم الصرفة1991-89412706-67032012-12-0162223310.37652/juaps.2012.6323463234Management of Identity and Access in the CloudKashif Kifayat0Sameeh Abdulghafour Jassim1Sufyan T. Faraj2LJMU-School of Comp. & Math.Liverpool, UKUniversity of Anbar - College of ComputerUniversity of Anbar - College of ComputerCloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps.https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdfaccess controlcloud computingcryptographyidentity and access managementsecurity
spellingShingle Kashif Kifayat
Sameeh Abdulghafour Jassim
Sufyan T. Faraj
Management of Identity and Access in the Cloud
مجلة جامعة الانبار للعلوم الصرفة
access control
cloud computing
cryptography
identity and access management
security
title Management of Identity and Access in the Cloud
title_full Management of Identity and Access in the Cloud
title_fullStr Management of Identity and Access in the Cloud
title_full_unstemmed Management of Identity and Access in the Cloud
title_short Management of Identity and Access in the Cloud
title_sort management of identity and access in the cloud
topic access control
cloud computing
cryptography
identity and access management
security
url https://juaps.uoanbar.edu.iq/article_63234_a30231527832880b054786f6700548e4.pdf
work_keys_str_mv AT kashifkifayat managementofidentityandaccessinthecloud
AT sameehabdulghafourjassim managementofidentityandaccessinthecloud
AT sufyantfaraj managementofidentityandaccessinthecloud