scholarly journals Platform capability based identity management for scalable and secure cloud service access

Author(s):  
Abhilasha Bhargav-Spantzel ◽  
Steve W. Deutsch
Author(s):  
Shravani Jasthi Et. al.

These days, in any application development, security for specific area has become crucial job in the service access environment. Since clients needs to utilize the unique services and resources in distributed computing environment. Here the security administrations and cloud portal frameworks have been highly advanced based on the client necessities. However cloud offers a lot of resources through the global service vendors and Multicloud technologies are rapidly in use, but still the cloud requires security enhancement. Applications become complex and have attacks when deployed on multiclouds .So it is very important factor to protect the data and resources from the hackers. In multiple cloud environments it is possible to control all the applications, user resources, secret information and other confidential user process level with the help of server less approach. The server less computing approach is a sort of Distributed computing execution model through which Cloud Service provider will allocate the resource to the client in a dynamic manner .This paper represents what is Multi cloud, advantages of Multicloud, Why Security issue with Multi cloud, How server less is different from monolith services and Security Approaches to multi cloud with server less computing.


Author(s):  
Magnus Andersson ◽  
Rikard Lindgren

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.


Author(s):  
Mohammad M.R. Chowdhury ◽  
Josef Noll

In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those services can be controlled and used ubiquitously—from everywhere, at any time. Not much research has been conducted in the field of integrated communication offers. The novelty of this study is in that it addresses the ubiquitous communication system, called the multi-play service, from the perspectives of both the customer preference and operator strategy and transforms this into valuation of resources and capabilities. This chapter provides a framework to connect the customer value preferences to firm resources. The aim of the framework is to connect customer and resource-based strategies together. As a result of the analysis the authors reveal the most important resources in contrast to the customer value preferences.


Author(s):  
Bing He ◽  
Tuan T. Tran ◽  
Bin Xie

Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.


2016 ◽  
Vol 58 ◽  
pp. 13-28 ◽  
Author(s):  
Alejandro Pérez Méndez ◽  
Rafael Marín López ◽  
Gabriel López Millán
Keyword(s):  

2021 ◽  
pp. 1-12
Author(s):  
Rajkumar Rajavel ◽  
Sathish Kumar Ravichandran ◽  
Partheeban Nagappan ◽  
Kanagachidambaresan Ramasubramanian Gobichettipalayam

A major demanding issue is developing a Service Level Agreement (SLA) based negotiation framework in the cloud. To provide personalized service access to consumers, a novel Automated Dynamic SLA Negotiation Framework (ADSLANF) is proposed using a dynamic SLA concept to negotiate on service terms and conditions. The existing frameworks exploit a direct negotiation mechanism where the provider and consumer can directly talk to each other, which may not be applicable in the future due to increasing demand on broker-based models. The proposed ADSLANF will take very less total negotiation time due to complicated negotiation mechanisms using a third-party broker agent. Also, a novel game theory decision system will suggest an optimal solution to the negotiating agent at the time of generating a proposal or counter proposal. This optimal suggestion will make the negotiating party aware of the optimal acceptance range of the proposal and avoid the negotiation break off by quickly reaching an agreement.


2016 ◽  
pp. 1629-1651
Author(s):  
Bing He ◽  
Tuan T. Tran ◽  
Bin Xie

Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.


2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Lifa Wu ◽  
Shengli Zhou ◽  
Zhenji Zhou ◽  
Zheng Hong ◽  
Kangyu Huang

In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.


Author(s):  
Adrija Bhattacharya ◽  
Sankhayan Choudhury ◽  
Agostino Cortesi

Abstract Cloud federation is an aggregation of services from different providers in a single pool supporting interoperability and resource migration. In federation, Services are assigned to the consumer’s service access pool as per their specific functional and associated Quality level requirements. The said assignment is based on the advertised features of services. Sometimes, the selected provider fails to provide the committed service or, it fails to fulfill the expected QoS level. As a result, the consumer is being deprived of getting the services at required quality levels, in spite of subscribing and paying. Re-federation i.e. the inclusion of new services from different providers in the resource pool is a solution. This costly and time consuming re-federation process harms the overall harmony, reputation and performance of the existing federation. In this paper, the necessary strategies to make a federation autonomic is proposed. It helps federation to work in a self-adaptive manner by delaying the re-federation process through replacement and negotiation mechanisms. This allows the federation to keep a balanced state in case of failures. The proposed methods are simulated and the claims are substantiated by the preliminary experimental outcomes.


Sign in / Sign up

Export Citation Format

Share Document