A Model Apporach for Identity and Access Management (IAM) System in the Cloud

Main Article Content

Dr. Anil Kumar
Dr. Abhay Bhatia
Dr. Anju Mishra
Tanu Gupta

Abstract

Through use of cloud computing, information may be accessible from a range of different types of devices. It is now possible to communicate with a company at any time or location, regardless of location or time zone. Using the cloud has a number of advantages, some of which include lower expenditures on information technology and infrastructure expenses, more agility, and improved continuity planning. These benefits can only be attained via the implementation of a reliable identity and access control system for cloud applications and services. Managing these identities and limiting the access that cloud clients and applications have continues to be a significant challenge in the modern day. In order to strengthen the protection offered by a venture, it is necessary to set up a trust worthy identity and access management (IAM) system in the cloud. The findings of this study provide an intelligent and reliable IAM system that is based on cloud computing.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Dr. Anil Kumar, Dr. Abhay Bhatia, Dr. Anju Mishra, and Tanu Gupta, “A Model Apporach for Identity and Access Management (IAM) System in the Cloud”, IJSCE, vol. 13, no. 6, pp. 28–36, Sep. 2024, doi: 10.35940/ijsce.D3645.13060124.
Section
Articles

How to Cite

[1]
Dr. Anil Kumar, Dr. Abhay Bhatia, Dr. Anju Mishra, and Tanu Gupta, “A Model Apporach for Identity and Access Management (IAM) System in the Cloud”, IJSCE, vol. 13, no. 6, pp. 28–36, Sep. 2024, doi: 10.35940/ijsce.D3645.13060124.

References

Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2022). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics (Switzerland), 11(1), 1–34. https://doi.org/10.3390/electronics1101001https://doi.org/10.3390/electronics11010016

Andi, H. K. (2021). Analysis of Serverless Computing Techniques in Cloud Software Framework. Journal of ISMAC, 3(3), 221–234. https://doi.org/10.36548/jismac.2021.3.004 https://doi.org/10.36548/jismac.2021.3.004

de Almeida, M. G., & Canedo, E. D. (2022). Authentication and Authorization in Microservices Architecture: A Systematic Literature Review. Applied Sciences (Switzerland), 12(6). https://doi.org/10.3390/app12063023https://doi.org/10.3390/app12063023

Editors, L., Yasuda, K., Lodderstedt, T., Nakamura, K., & Vercammen, J. (2022). OpenID for Verifiable Credentials. https://doi.org/10.1145/3442381.3450085

Liu, G., Gao, X., & Wang, H. (2021). An investigation of identity-account inconsistency in single sign-on. The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021, April 2021, 105–117. https://doi.org/10.1145/3442381.3450085

Mohammed, I. A. (2021). Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled. August. www.ijcrt.org

Partida, A., Criado, R., & Romance, M. (2021). Identity and access management resilience against intentional risk for blockchain-based IOT platforms. Electronics (Switzerland), 10(4), 1–26. https://doi.org/10.3390/electronics10040378https://doi.org/10.3390/electronics10040378

Programme, D., Electrical, I. N., & Engineering, A. (2022). Regulations in Identity and Access Management.

Shankar, T. N., Rakesh, P., Bhargawa Rao, T., Hari Bharadwaj, L., Rakesh, C., & Lakshmi Madhuri, M. (2021). Providing security to land record with the computation of iris, blockchain, and one time password. Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 226–231. https://doi.org/10.1109/ICCCIS51004.2021.9397176https://doi.org/10.1109/ICCCIS51004.2021.9397176

Slamet, C., Syaripudin, U., Kaffah, F. M., & Tiasto, B. E. (2021). Implementation of Rivest Cypher 4 algorithm in Security Assertion Mark-up Language protocols on Single Sign-On services. IOP Conference Series: Materials Science and Engineering, 1098(3), 032109. https://doi.org/10.1088/1757-899x/1098/3/032109https://doi.org/10.1088/1757-899X/1098/3/032109

Wu, L., Cai, H. J., & Li, H. (2021). SGX-UAM: A secure unified access management scheme with one time passwords via intel SGX. IEEE Access, 9(March 2012), 38029–38042. https://doi.org/10.1109/ACCESS.2021.3063770. https://doi.org/10.1109/ACCESS.2021.3063770

Almulla, S. A., & Yeun, C. Y. (2010). Cloud computing security management. In 2010 Second International Conference on Engineering System Management and Applications (pp. 1-7). IEEE.

Mukundrao, J.A. and Vikram, G.P., 2011. Enhancing security in cloud computing. In Information and Knowledge Management (Vol. 1, No. 1, pp. 40-44).

Zahoor, E., Asma, Z. and Perrin, O., 2017. A formal approach for the verification of AWS IAM access control policies. In Service-Oriented and Cloud Computing: 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings 6 (pp. 59-74). Springer International Publishing. https://doi.org/10.1007/978-3-319-67262-5_5

Goyal, Ms. P., & Deora, Dr. S. S. (2022). Reliability of Trust Management Systems in Cloud Computing. In Indian Journal of Cryptography and Network Security (Vol. 2, Issue 1, pp. 1–5). https://doi.org/10.54105/ijcns.c1417.051322https://doi.org/10.54105/ijcns.C1417.051322

Karthiga, S., & Velmurugan, Dr. T. (2020). Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 912–920). https://doi.org/10.35940/ijitee.d1363.029420 https://doi.org/10.35940/ijitee.D1363.029420

Mishra, J. P., Panda, S. R., Mishra, S. K., & Pati, B. (2019). A Novel Observation on Cloud Computing in Education. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 5262–5274). https://doi.org/10.35940/ijrte.c5910.098319 https://doi.org/10.35940/ijitee.D1363.029420

Radhamani, V., & Dalin, G. (2019). Significance of Artificial Intelligence and Machine Learning Techniques in Smart Cloud Computing: A Review. In International Journal of Soft Computing and Engineering (Vol. 9, Issue 3, pp. 1–7). https://doi.org/10.35940/ijsce.c3265.099319 https://doi.org/10.35940/ijrte.C5910.098319

Kumar, Y. K., & Shafi, Dr. R. M. (2019). Key Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1, pp. 7220–7225). https://doi.org/10.35940/ijeat.a9995.109119 https://doi.org/10.35940/ijeat.A9995.109119

Most read articles by the same author(s)

1 2 3 4 > >>