Authentication and Identity Management for Secure Cloud Businesses and Services

Authentication and Identity Management for Secure Cloud Businesses and Services

Bing He, Tuan T. Tran, Bin Xie
ISBN13: 9781522501596|ISBN10: 1522501592|EISBN13: 9781522501602
DOI: 10.4018/978-1-5225-0159-6.ch071
Cite Chapter Cite Chapter

MLA

He, Bing, et al. "Authentication and Identity Management for Secure Cloud Businesses and Services." Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 1629-1651. https://doi.org/10.4018/978-1-5225-0159-6.ch071

APA

He, B., Tran, T. T., & Xie, B. (2016). Authentication and Identity Management for Secure Cloud Businesses and Services. In I. Management Association (Ed.), Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications (pp. 1629-1651). IGI Global. https://doi.org/10.4018/978-1-5225-0159-6.ch071

Chicago

He, Bing, Tuan T. Tran, and Bin Xie. "Authentication and Identity Management for Secure Cloud Businesses and Services." In Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1629-1651. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0159-6.ch071

Export Reference

Mendeley
Favorite

Abstract

Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.