Decentralized Identity and Access Management of Cloud for Security as a Service

Author(s):  
Soumya Prakash Otta ◽  
Subhrakanta Panda
2016 ◽  
Vol 79 ◽  
pp. 170-174 ◽  
Author(s):  
Deepak H. Sharma ◽  
C.A. Dhote ◽  
Manish M. Potey

Author(s):  
Yazhe Wang ◽  
Shunan Ma ◽  
Lei Ren

Cloud manufacturing has been considered as a promising new service-oriented manufacturing paradigm that can transform traditional industry. However security is one of the major issues which hamper the growth of cloud manufacturing industry. In this paper, we analyze the cloud manufacturing security issues and challenges, and propose a security framework for cloud manufacturing, which includes four levels: infrastructure security, identity and access management, data protection and security, and cloud security as a service. The Infrastructure security level can ensure an organization’s core IT infrastructure security at the network, host, and application levels; Identity and access management level can improve operational efficiency and to comply with privacy and data protection requirements; Data protection and security level can help users evaluate their data security scenarios and make informed judgments regarding risk for their organizations; security as a service level, which includes web security service, storage security service and IAM(Identity and Access Management) service, would extract security functions and capacities to assemble software as a service. The cloud manufacturing security framework we proposed can resolve the security issues and improve the security performance of cloud manufacturing industry.


2021 ◽  
Vol 1964 (6) ◽  
pp. 062080
Author(s):  
K Kalimuthu ◽  
C Balarengadurai ◽  
A Akilandeswari ◽  
A Raja

Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 378
Author(s):  
Alberto Partida ◽  
Regino Criado ◽  
Miguel Romance

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.


Sign in / Sign up

Export Citation Format

Share Document