Surveing the challenges and requirements for identity in the cloud

Naoufal Ben Bouazza, M. Lemoudden, B. El Ouahidi
{"title":"Surveing the challenges and requirements for identity in the cloud","authors":"Naoufal Ben Bouazza, M. Lemoudden, B. El Ouahidi","doi":"10.1109/JNS4.2014.6850127","DOIUrl":null,"url":null,"abstract":"Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th Edition of National Security Days (JNS4)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS4.2014.6850127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
调查云中身份的挑战和需求
云技术对IT部门来说越来越重要,因为它使他们能够专注于战略,而不是维护数据中心;云的最大优点是能够在多个提供商(尤其是混合云)之间共享计算资源,从而克服基础设施的限制。用户身份联合被认为是云中的第二大风险,由于业务组织使用多个云服务提供商,IT部门面临一系列限制。已经提出了解决这个问题的多种尝试,比如federated Identity,它有许多优点,尽管它面临着新技术中常见的挑战。下面的文章将讨论联邦身份、它的组件、优点和缺点,然后提出许多在混合云基础设施中管理身份的有用场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Intelligent architecture based on MAS and CBR for intrusion detection Surveing the challenges and requirements for identity in the cloud Securing private wireless sensors in a shared environment in the Internet of Things context Towards a new intelligent generation of intrusion detection system On access control requirements for inter-organizational workflow
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1