Review of Online Security on the Mount of Cloud Computing Identity Management

  • Rahul Sharma

Abstract

Newest technology helps different service providers to unite their efforts to address a wider business space. It is possible that people (who use a product or service) hold many accounts with the service providers like e-bay, Gmail, etc. The visibility and extent of attributes for every identity has to be checked for truth against a central trusted policy framing authority assumed by the systems. In such a system, much is in danger of being lost if identities are not handled with precaution to prevent trouble. Such situations are common to high end applications hosted on cloud (computers that do work for you but that are stored somewhere else and maintained by other companies). Identity management (IDM) assumes an upper hand in the whole area of cloud security. Cloud Computing is a combination of different technologies to meet the demands of a dependent maze of software and services. This result in more than two but not a lot of IDMs based on different technologies to interoperate and function as one grouped together body over a carefully shared user space. Because of this IDM in clouds projects some new dimensions that traditional IDMs cannot meet.

Most cloud vendors have a simplified unique IDM solution with problems that have to be understood. The challenge in this area is that there are a lot of works towards the IDM that gave birth to the idea of identity-as-a-Service (IaaS) [1]. IaaS vendors focus on complete, thorough and quick to send out and use solutions.

Published
2019-12-31
Section
Articles