IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Authentication and Identity Management for Secure Cloud Businesses and Services

Authentication and Identity Management for Secure Cloud Businesses and Services
View Sample PDF
Author(s): Bing He (Cisco Systems, Inc., USA), Tuan T. Tran (InfoBeyond Technology LLC, USA)and Bin Xie (InfoBeyond Technology LLC, USA)
Copyright: 2016
Pages: 23
Source title: Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-0159-6.ch071

Purchase

View Authentication and Identity Management for Secure Cloud Businesses and Services on the publisher's website for pricing and purchasing information.

Abstract

Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.

Related Content

Peter Arthur Barone. © 2023. 17 pages.
Patricia A. Goforth. © 2023. 22 pages.
Steven Lloyd Leeper. © 2023. 18 pages.
Neslihan Yayla. © 2023. 25 pages.
İlknur Gümüş. © 2023. 14 pages.
Sarah E. Daly. © 2023. 15 pages.
Yakup Alper Varış. © 2023. 22 pages.
Body Bottom