Paper
28 May 2013 Efficient identity management and access control in cloud environment
Author Affiliations +
Abstract
As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jonathan Gloster "Efficient identity management and access control in cloud environment", Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); https://doi.org/10.1117/12.2018032
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Data modeling

Computer security

Information security

Data storage

Network security

Information technology

Back to Top