Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/6233
Title: Management of Identity and Access in the Cloud
Authors: Faraj, Sufyan T.
Jassim, Sameeh Abdulghafour
Kifayat, Kashif
Keywords: Access Control
Cloud computing
Cryptography
Identity and access management
Security
Issue Date: 2012
Publisher: J. of university of anbar for pure science
Series/Report no.: 6;2
Abstract: Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps
URI: http://localhost:8080/xmlui/handle/123456789/6233
ISSN: 1991-8941
Appears in Collections:قسم نظم المعلومات

Files in This Item:
File Description SizeFormat 
7a58a011784e1b33.pdf549.44 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.