Identity and Access Management as Security-as-a-Service from Clouds

被引:17
|
作者
Sharma, Deepak H. [1 ]
Dhote, C. A. [2 ]
Potey, Manish M. [1 ]
机构
[1] KJ Somaiya Coll Engn, Mumbai 400077, Maharashtra, India
[2] PRMIT & R, Dept Comp Sci & Engn, Amravati 444701, India
关键词
Cloud Computing; Authentication; Authorization; Audit; Security Issues; Security-as-a-service;
D O I
10.1016/j.procs.2016.03.117
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and grating correct level of access for resources which are protected in the cloud environment. The IAM implemented as the cloud service can benefit the user with all the advantages offered by Security-as-a-service (SECaaS). We have implemented a proof-of-concept (POC) of IAM-aaS which is also evaluated. The relevant standards and technologies are also discussed for providing secure access to cloud users. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:170 / 174
页数:5
相关论文
共 50 条
  • [1] Implementing Intrusion Management as Security-as-a-Service from Cloud
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 363 - 366
  • [2] Intelligent Transparent Encryption-Decryption as Security-as-a-Service from Clouds
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 359 - 362
  • [3] Towards Security-as-a-Service in Multi-Access Edge
    Tourani, Reza
    Bos, Austin
    Misra, Satyajayant
    Esposito, Flavio
    [J]. SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 358 - 363
  • [4] An access control model for a grid environment employing security-as-a-service approach
    Olatunji, E.K.
    Adigun, M.O.
    Jembere, E.
    [J]. Lecture Notes in Electrical Engineering, 2015, 313 : 103 - 110
  • [5] Security-as-a-Service for Embedded Systems
    Vai, Michael
    Simpson, Eric
    Kava, Donato
    Lee, Alice
    Nguyen, Huy
    Hughes, Jeffrey
    Torres, Gabriel
    Lim, Jeffery
    Nahill, Ben
    Khazan, Roger
    Schneider, Fred
    [J]. MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [6] Security-as-a-service: a literature review
    Wang, Wenyuan
    Yongchareon, Sira
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2020, 16 (05) : 493 - 517
  • [7] A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    Niyato, Dusit
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 426 - 433
  • [8] Implementing Anti-Malware as Security-as-a-Service from Cloud
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 533 - 539
  • [9] The Security-as-a-Service Market for Small and Medium Enterprises
    Nazareth, Derek L.
    Choi, Jae
    Ngo-Ye, Thomas L.
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (05) : 954 - 964
  • [10] Security-as-a-Service in Big Data of Civil Aviation
    Wu Zhijun
    Wang Caiyun
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 240 - 244