Skip to main content

2024 | OriginalPaper | Buchkapitel

Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture

verfasst von : Vinay Yadav, Manish Kumar Soni, Ajay Pratap

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing environment combines a variety of networked devices to facilitate the provision of requested services. 8–9% challenges related to cloud are due to identity and access management. Numerous academics and industry experts have diligently tackled the challenges associated with ensuring secure access to cloud resources. It constitutes a core element of cloud security and assumes a pivotal role in the protection of data and assets housed and handled within cloud ecosystems. Identity management is used to authorization of registered users or customers and access management is used to provide access to user of data and services provided by cloud. Various identity management and access management protocols are compared in this research paper. Need of Zero Trust Architecture has been analyzed. Two major access management schemes are implemented with 10 roles and 18 polices using Zero Trust Architecture and its results shows the improvement in security performance of cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Siddiqui Z, Tayan O, Khurram Khan M (2018) Security analysis of smartphone and cloud computing authentication frameworks and protocols. IEEE Access 6:34527–34542 Siddiqui Z, Tayan O, Khurram Khan M (2018) Security analysis of smartphone and cloud computing authentication frameworks and protocols. IEEE Access 6:34527–34542
2.
Zurück zum Zitat Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6(1) Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6(1)
3.
Zurück zum Zitat Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420–147452CrossRef Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420–147452CrossRef
4.
Zurück zum Zitat Ahmad Z, Jehangiri AI, Alaanzy MA, Othman M, Latip R, Zaman SKU, Umar AI (2021) Scientific workflows management and scheduling in cloud computing: taxonomy, prospects, and challenges. IEEE Access 9:53491–53508CrossRef Ahmad Z, Jehangiri AI, Alaanzy MA, Othman M, Latip R, Zaman SKU, Umar AI (2021) Scientific workflows management and scheduling in cloud computing: taxonomy, prospects, and challenges. IEEE Access 9:53491–53508CrossRef
5.
Zurück zum Zitat Wang H, Yi X, Bertino E, Sun L (2014) Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Exp 28(3):600–615CrossRef Wang H, Yi X, Bertino E, Sun L (2014) Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Exp 28(3):600–615CrossRef
6.
Zurück zum Zitat Kumar PS (2020) Multi authority access control mechanism for secure cloud storage. Int J Cloud Comput Database Manage 1(2):07–10CrossRef Kumar PS (2020) Multi authority access control mechanism for secure cloud storage. Int J Cloud Comput Database Manage 1(2):07–10CrossRef
7.
Zurück zum Zitat Hahn C, Kim J, Kwon H, Hur J (2022) Efficient IoT management with resilience to unauthorized access to cloud storage. IEEE Trans Cloud Comput 10(2):1008–1020CrossRef Hahn C, Kim J, Kwon H, Hur J (2022) Efficient IoT management with resilience to unauthorized access to cloud storage. IEEE Trans Cloud Comput 10(2):1008–1020CrossRef
8.
Zurück zum Zitat Sharma D, Kumar G, Sharma R (2021) Analysis of heterogeneous data storage and access control management for cloud computing under M/M/c queueing model. Int J Cloud Appl Comput 11(3):58–71 Sharma D, Kumar G, Sharma R (2021) Analysis of heterogeneous data storage and access control management for cloud computing under M/M/c queueing model. Int J Cloud Appl Comput 11(3):58–71
9.
Zurück zum Zitat Oh SM, Ashiquzzaman A, Lee D (2019) A survey on virtualized platform for multi-access edge computing (MEC) technology. Int J Private Cloud Comput Environ Manage 6(1):1–18 Oh SM, Ashiquzzaman A, Lee D (2019) A survey on virtualized platform for multi-access edge computing (MEC) technology. Int J Private Cloud Comput Environ Manage 6(1):1–18
10.
Zurück zum Zitat Zhou Z, Wu L, Hong Z (2013) Context-aware access control model for cloud computing. Int J Grid Distrib Comput 6(6):1–12CrossRef Zhou Z, Wu L, Hong Z (2013) Context-aware access control model for cloud computing. Int J Grid Distrib Comput 6(6):1–12CrossRef
11.
Zurück zum Zitat Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput 9(1):33–49 Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput 9(1):33–49
12.
Zurück zum Zitat Amoon M (2016) Adaptive framework for reliable cloud computing environment. IEEE Access 4:9469–9478CrossRef Amoon M (2016) Adaptive framework for reliable cloud computing environment. IEEE Access 4:9469–9478CrossRef
13.
Zurück zum Zitat Günther J, Praeg CP (2023) Significance and management of cloud computing, multi-cloud and cloud brokerage in companies. HMD Praxis Der Wirtschaftsinformatik Günther J, Praeg CP (2023) Significance and management of cloud computing, multi-cloud and cloud brokerage in companies. HMD Praxis Der Wirtschaftsinformatik
14.
Zurück zum Zitat Sun P (2020) Research on cloud computing service based on trust access control. Int J Eng Bus Manage 12:184797901989744CrossRef Sun P (2020) Research on cloud computing service based on trust access control. Int J Eng Bus Manage 12:184797901989744CrossRef
15.
Zurück zum Zitat Jain T (2017) Secure big data access control policies for cloud computing environment. Int J Innov Res Comput Sci Technol 5(2):253–256CrossRef Jain T (2017) Secure big data access control policies for cloud computing environment. Int J Innov Res Comput Sci Technol 5(2):253–256CrossRef
16.
Zurück zum Zitat Chadwick DW, Casenove M, Siu K (2013) My private cloud—granting federated access to cloud resources. J Cloud Comput Adv Syst Appl 2(1):3CrossRef Chadwick DW, Casenove M, Siu K (2013) My private cloud—granting federated access to cloud resources. J Cloud Comput Adv Syst Appl 2(1):3CrossRef
17.
Zurück zum Zitat Alsirhani A, Ezz M, Mohamed Mostafa A (2022) Advanced authentication mechanisms for identity and access management in cloud computing. Comput Syst Sci Eng 43(3):967–984 Alsirhani A, Ezz M, Mohamed Mostafa A (2022) Advanced authentication mechanisms for identity and access management in cloud computing. Comput Syst Sci Eng 43(3):967–984
18.
Zurück zum Zitat Rizvi S, Mitchell J (2016) A new access control scheme for protecting distributed cloud services and resources. Serv Trans Cloud Comput 4(3):28–41 Rizvi S, Mitchell J (2016) A new access control scheme for protecting distributed cloud services and resources. Serv Trans Cloud Comput 4(3):28–41
19.
Zurück zum Zitat Zhang Y, Li J, Chen X, Li H (2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec Commun Netw 9(14):2397–2411CrossRef Zhang Y, Li J, Chen X, Li H (2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec Commun Netw 9(14):2397–2411CrossRef
Metadaten
Titel
Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture
verfasst von
Vinay Yadav
Manish Kumar Soni
Ajay Pratap
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_47

Neuer Inhalt