DocumentCode
525565
Title
Cloud computing security management
Author
Almulla, Sameera Abdulrahman ; Yeun, Chan Yeob
Author_Institution
Khalifa Univ. of Sci., Technol. & Res. (KUSTAR), Sharjah, United Arab Emirates
fYear
2010
fDate
March 30 2010-April 1 2010
Firstpage
1
Lastpage
7
Abstract
Enterprises are seeking toward the cloud horizon to expand their premises facilities. It provides several services in the market, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper will discuss challenges regarding three information security concerns: confidentiality, integrity and availability. Most of the organizations are very much concerned about the ownership of their data. This paper will not only address security challenges for cloud computing including Identity and Access Management (IAM) but also present the current state authentication, authorization and auditing of users accessing the cloud along with emerging IAM protocols and standards.
Keywords
Internet; business data processing; security of data; IAM; IaaS; PaaS; SaaS; cloud computing security management; cloud horizon; identity and access management; information security; infrastructure as a service; platform as a service; software as a service; Cloud computing; Costs; Data security; Hardware; Identity management systems; Information security; Privacy; Productivity; Protocols; Software maintenance; Cloud Computing; Identity and Access Management; Privacy; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on
Conference_Location
Sharjah
Print_ISBN
978-1-4244-6520-0
Electronic_ISBN
978-9948-427-14-8
Type
conf
Filename
5542654
Link To Document