DocumentCode :
173047
Title :
Surveing the challenges and requirements for identity in the cloud
Author :
Ben Bouazza, Naoufal ; Lemoudden, Mouad ; El Ouahidi, Bouabid
Author_Institution :
LRI, Mohammed V Univ. - Agdal, Rabat, Morocco
fYear :
2014
fDate :
12-13 May 2014
Firstpage :
1
Lastpage :
5
Abstract :
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.
Keywords :
cloud computing; security of data; business organizations; cloud service providers; cloud technologies; computing resource sharing; data centers; federated identity management; hybrid clouds; user identity federation; Access control; Authentication; Cloud computing; Computational modeling; Computers; Organizations; Access control; Claim; Cloud; Federated identity; Federation provider; Identity provider; SaaS; Security; Token;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Days (JNS4), Proceedings of the 4th Edition of National
Conference_Location :
Tetuan
Print_ISBN :
978-1-4799-5586-2
Type :
conf
DOI :
10.1109/JNS4.2014.6850127
Filename :
6850127
Link To Document :
بازگشت