Management of Identity and Credentials in Mobile Cloud Environment

被引:0
|
作者
Jana, Debasish [1 ]
Bandyopadhyay, Debasis [2 ]
机构
[1] TEOCO Software Pvt Ltd, BIT Mesra, Kolkata, India
[2] RS Software I Ltd, BIT Mesra, Kolkata, India
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the significant objective of most enterprise information security measures is to ensure providing robust identity and access management (IAM) to its users. This encompasses systems straddling across the globe allowing the access of sensitive as well as confidential data of the enterprise at any point in time. With rapid mounting proliferation of mobile devices but with limited resources, cloud computing has emerged as an obvious predilection for performing resource intensive tasks over the cloud. To address the security issues, cloud service providers (CSPs) are coming up with new services such as Security as a Service (SecaaS). From our analysis of security threats and its measures, we feel that additional controls are required for Identity and Access Management for mobile cloud users. We have made some security recommendations along with best practices for consumers and service providers to consider ensuring robust information security including IAM for growing mobile users in cloud.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [1] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [2] Secure Identity Management System for Federated Cloud Environment
    Habiba, Umme
    Masood, Rahat
    Shibli, Muhammad Awais
    [J]. SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2015, 569 : 17 - 33
  • [3] Efficient Identity Management and Access Control in Cloud Environment
    Gloster, Jonathan
    [J]. CYBER SENSING 2013, 2013, 8757
  • [4] Identity and access management in cloud environment: Mechanisms and challenges
    Indu, I.
    Anand, P. M. Rubesh
    Bhaskar, Vidhyacharan
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2018, 21 (04): : 574 - 588
  • [5] A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards
    Naik, Nitin
    Jenkins, Paul
    [J]. 2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 89 - 90
  • [6] Improved Identity Management with Verifiable Credentials and FIDO
    Chadwick D.W.
    Laborde R.
    Oglaza A.
    Venant R.
    Wazan S.
    Nijjar M.
    [J]. IEEE Communications Standards Magazine, 2019, 3 (04): : 14 - 20
  • [7] Efficient Management of Privacy Issues in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 481 - 486
  • [8] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    [J]. COMPUTER NETWORKS, 2014, 65 : 99 - 110
  • [9] Improved Identity Management Protocol for Secure Mobile Cloud Computing
    Park, In-Shin
    Lee, Yoon-Deock
    Jeong, Jonpil
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4958 - 4965
  • [10] Efficient Management of Security and Privacy Issues in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    [J]. 2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,