Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cloud identity management security issues & solutions: a taxonomy
by
Shibli, Muhammad Awais
, Niazi, Muaz A
, Habiba, Umme
, Masood, Rahat
in
Complex Systems
/ Management Science
/ Mathematics
/ Mathematics and Statistics
/ Modeling Large-scale Communication Networks Using Complex Networks & Agent-based Modeling Techniques
/ Operations Research
/ Operations Research/Decision Theory
/ Simulation and Modeling
2014
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cloud identity management security issues & solutions: a taxonomy
by
Shibli, Muhammad Awais
, Niazi, Muaz A
, Habiba, Umme
, Masood, Rahat
in
Complex Systems
/ Management Science
/ Mathematics
/ Mathematics and Statistics
/ Modeling Large-scale Communication Networks Using Complex Networks & Agent-based Modeling Techniques
/ Operations Research
/ Operations Research/Decision Theory
/ Simulation and Modeling
2014
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cloud identity management security issues & solutions: a taxonomy
by
Shibli, Muhammad Awais
, Niazi, Muaz A
, Habiba, Umme
, Masood, Rahat
in
Complex Systems
/ Management Science
/ Mathematics
/ Mathematics and Statistics
/ Modeling Large-scale Communication Networks Using Complex Networks & Agent-based Modeling Techniques
/ Operations Research
/ Operations Research/Decision Theory
/ Simulation and Modeling
2014
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cloud identity management security issues & solutions: a taxonomy
Journal Article
Cloud identity management security issues & solutions: a taxonomy
2014
Request Book From Autostore
and Choose the Collection Method
Overview
Purpose
Cloud computing systems represent one of the most complex computing systems currently in existence. Current applications of Cloud involve extensive use of distributed systems with varying degree of connectivity and usage. With a recent focus on large-scale proliferation of Cloud computing, identity management in Cloud based systems is a critical issue for the sustainability of any Cloud-based service. This area has also received considerable attention from the research community as well as the IT industry. Numerous Cloud Identity Management Systems (IDMSs) have been proposed so far; however, most of those systems are neither widely accepted nor considered highly reliable due to their constraints in terms of scope, applicability and security. In order to achieve reliability and effectiveness in IDMs for Cloud, further extensive research needs to be carried out to critically examine Cloud based IDMSs and their level of security.
Methods
In this work, we have holistically analyzed Cloud IDMSs to better understand the general as well as the security aspects of this domain. From the security perspective, we present a comprehensive list of attacks that occur frequently in Cloud based IDMSs. In order to alleviate those attacks, we present a well-organized taxonomy tree covering the most desired features essential for any Cloud-based IDMSs. Additionally, we have specified various mechanisms of realization (such as access control polices, encryption, self-service) against each of the features of Cloud IDMSs. We have further used the proposed taxonomy as an assessment criterion for the evaluation of Cloud based IDMSs.
Results
Our in-depth analysis of various Cloud based IDMSs reveals that most of the systems do not offer support to all the essential features of Cloud IDMS and the ones that do, have their own certain weaknesses. None of the discussed techniques heuristically covers all the security features; moreover, they lack compliance to international standards which, understandably, undermines their credibility.
Conclusion
Presented work will help Cloud subscribers and providers in understanding the available solutions as well as the involved risks, allowing them to make more knowledgeable decisions while selecting potential Cloud IDMSs that best suits their functional and security requirements.
Publisher
Springer Berlin Heidelberg,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.