Identity management practices in cloud computing environments Online publication date: Tue, 03-Jun-2014
by Aashish Bhardwaj; Vikas Kumar
International Journal of Cloud Computing (IJCC), Vol. 3, No. 2, 2014
Abstract: The increased global connectivity has increased the number of identities taking part in the digital world, as well as their interactions. In such an environment, the identity management becomes a superset of all corresponding issues in establishing trust and reputation among customers. This paper presents identity management problem as a whole, with specific identity breach incidents. Composition of the identities and their attributes has also been discussed in detail. Best practices for identity management and access control services like Active Directory Federation Services (ADFS) for intra-organisation services, as well as services such as Windows Live ID, Google, Yahoo, Facebook and OpenID for worldwide control across internet have been presented. Each application has a choice to accept an identity provider it trusts. The paper further addresses future identity management problems, which will be more complex in nature and will deal with interconnected devices, machines, software components and addresses along with the user identities.
Online publication date: Tue, 03-Jun-2014
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org