Abstract

Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.

Highlights

  • Access Control is an authentication system that authorizes an authority or enables control access

  • By using Single Sign-On and OAuth Protocol on one user, users can able to share their content to several clouds and several users can share their content to single cloud [11]

  • A) Cloud-Dependent Identity Management b) Powerful Client Management c) Developing Bring Your Own Device (BYOD) mechanism d) Application of attribute-based access control (ABAC) This paper is structured as follows: first part presents the literature survey followed by a description of Access Management in Cloud computing in second and third section

Read more

Summary

Introduction

Access Control is an authentication system that authorizes an authority or enables control access. Powerful identity and access management (IAM) is essential to reduce the security issues of distributed computing [3]. The attributes and required data essentially utilized for access and identification have to be released [10] These designs cannot solve the problem, since one user shares his identity across multiple clouds (i.e. Single Sign-On). A) Cloud-Dependent Identity Management b) Powerful Client Management c) Developing Bring Your Own Device (BYOD) mechanism d) Application of attribute-based access control (ABAC) This paper is structured as follows: first part presents the literature survey followed by a description of Access Management in Cloud computing in second and third section. Role of Identity Access Management in industry and IAM development in cloud environments are discussed in section four and five respectively.

Literature survey
A User Identity Management Protocol for Cloud Computing Paradigm
Access management in cloud computing
Authentication
Role of identity access management in industry
Amazon EC2
IBM blue mix
Microsoft azure
Google cloud
Dream host
Validation managing
Client managing
Authorization managing
Access managing
Information managing and provisioning
Risks per dimension
Information risks
Technology risks
Operational risks
Open issues
Gap analysis
Conclusion & future work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call