Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6233
Title: | Management of Identity and Access in the Cloud |
Authors: | Faraj, Sufyan T. Jassim, Sameeh Abdulghafour Kifayat, Kashif |
Keywords: | Access Control Cloud computing Cryptography Identity and access management Security |
Issue Date: | 2012 |
Publisher: | J. of university of anbar for pure science |
Series/Report no.: | 6;2 |
Abstract: | Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps |
URI: | http://localhost:8080/xmlui/handle/123456789/6233 |
ISSN: | 1991-8941 |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
7a58a011784e1b33.pdf | 549.44 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.