Title :
Cloud security assessment and identity management
Author :
Bhardwaj, Aashish ; Kumar, Vikas
Author_Institution :
Guru Tegh Bahadur Inst. of Technol., New Delhi, India
Abstract :
Cloud Computing is the long dreamed vision of computing as a utility, to provide on-demand applications and services. Users can be relieved from the burden of local data storage and maintenance by hosting their data on the clouds. With all its inherent value, the cloud introduces significant security challenges for both the consumers and cloud service providers in all the public, private, and hybrid cloud configurations. In this paper, security challenges (specifically the identity breach) for both consumers and service providers is presented. Cloud security assessment with Quantitative risk and impact framework (QUIRC) and Wide-band Delphi method have been proposed as a suitable process for collecting input from expert consensus. Major security breach incidents of the past have been discussed along with the present day cloud challenges as per the Cloud Security Alliance. A Dymanic Identity Mapping Association N Discovery System (DIMANDS) as an identity solution for large scale heterogeneous network environments is also discussed.
Keywords :
cloud computing; data privacy; security of data; Cloud Security Alliance; DIMANDS solution; Dymanic Identity Mapping Association N Discovery System; cloud computing; cloud data hosting; cloud identity management; cloud security assessment; data maintenance; data storage; heterogeneous network environment; hybrid cloud configuration; identity breach; private cloud configuration; public cloud configuration; quantitative risk and impact framework; security breach incidents; service provider; wideband Delphi method; Security; Cloud Computing; DIMANDS; Management; Privacy QUIRC;
Conference_Titel :
Computer and Information Technology (ICCIT), 2011 14th International Conference on
Conference_Location :
Dhaka
Print_ISBN :
978-1-61284-907-2
DOI :
10.1109/ICCITechn.2011.6164819