A Decentralized Approach for Implementing Identity Management in Cloud Computing

Author(s):  
Jun Chen ◽  
Xing Wu ◽  
Shilin Zhang ◽  
Wu Zhang ◽  
Yanping Niu
Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


2016 ◽  
pp. 399-422
Author(s):  
Hirra Anwar ◽  
Muhammad Awais Shibli ◽  
Umme Habiba

Numerous Cloud Identity Management (IdM) systems have been designed and implemented to meet the diverse functional and security requirements of various organizations. These requirements are subjective in nature; for instance, some government organizations require security more than efficiency while others prioritize performance and immediate response over security. However, most of the existing IdM systems are incapable of handling the user-centricity, security & technology requirements and are also domain specific. In this regard, this chapter elaborates the need to use Cloud Computing technology for enhancing the effectiveness and transparency of IdM functions and presents a comprehensive and well-structured Extensible IdM Framework for Cloud based e-government institutions. We present the design and implementation details of the proposed framework, followed by a case study which shows how government organizations of Pakistan would use the proposed framework to improve their IdM processes and achieve diverse IdM services.


Author(s):  
V. Neelaya Dhatchayani ◽  
V.S. Shankar Sriram

2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


Author(s):  
Alina Mădălina Lonea ◽  
Huaglory Tianfield ◽  
Daniela Elena Popescu

2020 ◽  
pp. 1-13
Author(s):  
Xiufang Liang ◽  
Lv Haiping ◽  
Jie Liu ◽  
Lin Lin

Based on the cloud computing artificial intelligence model, the English interactive teaching model summarized and analyzed in an in-depth manner, the characteristics of the smart classroom explored, and the interactive teaching model reform practiced. This article has studied and analyzed the classic teaching model. Finally, based on constructivism, the advantages of the constructivism teaching model, cooperative teaching model, and mastering learning model selected to construct the teaching model of artificial intelligence courses. Through the questionnaire survey of the current teaching status of artificial intelligence courses, and the investigation of each link of the constructed model, according to the results of the survey to optimize the construction of artificial intelligence courses teaching model to make it more perfect. Based on the cloud computing technology, the system architecture and function module division of the network open class platform designed based on the overall needs, and developed and implemented on this basis. Through global and local two-level authentication, user information synchronization, and interconnection between homogeneous clouds, the identity management function realized. With the help of the e-schoolbag function, the learning results continuously and accurately evaluated, so that every learner can get a good learning experience.


Sign in / Sign up

Export Citation Format

Share Document