1 / 8

TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD

The present article helps the USA, the UK and the Australian students pursuing their computer Science postgraduate degree dissertation to identify right topic algorithm and coding ideas in the area of computer science specifically on developing secure, and flexible management policy for multiple users over the cloud the security and privacy issues in the cloud environment for efficient cloud service provisioning. These dissertation topics are researched in-depth at various British universities. Tutors India offers UK Dissertation Research Topics Services and assignment writing services in Computer Science Engineering Domain. When you Order Computer Science Dissertation or assignment Services or seek help at Tutors India, we promise you the following u2013 Plagiarism free, Always on Time, outstanding customer support, written to Standard, Unlimited Revisions support and High-quality Subject Matter Experts <br>Contact: <br>Website: www.tutorsindia.com<br>Email: info@tutorsindia.com<br>UnitedKingdom: +44-1143520021 <br>India: +91-4448137070 <br>Whatsapp Number: +91-8754446690<br>Address: No:10, Kutty Street, Nungambakkam, Chennai -34

tutorsindia
Download Presentation

TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tutors India Lab Tutors India Lab TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD 1 | Engineering and Technology

  2. Tutors India Lab EXECUTIVE SUMMARY for both multiple Users and cloud system. Developing Secure and Flexible Management Policy 1 Identity and access management process is capable of per forming functions like information exchange, administration, maintenance, management and data authentication. 2 To enhance the performance of flexible management using effective key-based authentication approach. 3 1 | Engineering and Technology 2

  3. Tutors India Lab INTRODUCTION The ascent of Cloud Computing (CC), a huge number of clients and different applications have looked to speak with one another, swapping sen- sitive information (Werner, Westphall, & Westphall, 2017). In consequences, for efficiently managing various resources and applications, the use of tools and models is significant for securely man- aging different user identities as well as avoiding compromising data privacy. For this, most of them suggested a federated identity management pro- cess which utilizes the privacy appliances towards assisting in consistence with current legislation. In the section, we analyse the privacy and security issues in cloud identity management and relating the features and challenges. At the end we dis- cuss brief note of recommendation for Developing Secure and Flexible Management Policy for both multiple Users and cloud system. 1 | Engineering and Technology 3

  4. Tutors India Lab SIGNIFICANCE AND NEED OF IDENTITY MANAGEMENT AND FINE-GRAINED ACCESS CONTROL POLICIES Generally, the CC improves the managing capability of computing sources through merging the con- cepts like on-demand use, elasticity and resource allocation in a dynamic manner (Eludiora et al., 2011). However, for multiple users, cloud system and huge amount of data in the field of big data application becomes complex (Subashini & Kavitha, 2011) wherein the concern of privacy issues. In this perspective, Identity and Access Management (IAM) is frequently used towards providing access control facilities and control identity of data. Few of the identity management (IM) tools utilizes with appro- priate individualities (S. Singh, Jeong, & Park, 2016) by considering various mechanism for addressing privacy issues. But, till there is an issue like user data leakage, lack of control on the dissemination of per sonal information are recurring and distribution of unnecessary attributes in cloud environments (Cas tiglione et al., 2015; A. Singh & Chatterjee, 2015). So, to obtain cloud identity management as well as met the present regulation, the providers should protect the user privacy, data, entities and data throughout their lifecycle. (Indu, Anand, & Bhaskar, 2018; Wer- ner et al., 2017). This identity management proce- dure will meet the requirement fine-grained access control process and user flexibility of data access. IM components dealt with the need for authoriza- tion and authentication Legillon et al. (2013) in the cloud environment (Oliveira, Trinta, Vieira, & Cortes, 2018). The pictorial representation of Cloud Storage System with respect to the system Characteristics, Need and Challenges are discussed below Overview of Cloud Storage System Based on Characteristics, Need and Challenges 1 | Engineering and Technology 4

  5. Tutors India Lab BRIEF NOTES ON AUTHENTICATION, AUTHORIZATION, IDENTITY AND ACCESS MANAGEMENT Authentication (AN) The term AN is defined as the process of approving an entity via other entity which is used to ensure whether the application or person is qualified for claiming or accessing data. The common AN approaches are third party authentication, 3D password objects, digital device authentication, multifactor authentication, simple text passwords, biometric authentication and graphical passwords. Nowadays, cloud access consent is granted via the IM system (Butun, Erol-Kantarci, Kantarci, & Song, 2016; Indu et al., 2018). Authorization (AR) Based on the authenticated user’s entitlements, the AR will be disagreeing or permitting access to a particu- lar resource. AR decides like what applications or which user is permitted to make on system and application/ user identity data are used for decision making Khan et al., 2014). The cloud network comprises various service providers in which a single user can access various services at same time whereas each service from various security levels and service provider “Indu et al., 2018’.For ensuring the valid user’s access (for various services and resources) in IAM system, an access control governance cloud service provider (CSPs) defines the set of policies which is relevant to the access control. To meet the objective of each organization, CSPs should ensure the significant features such as Governance, Risk Management and Compliance (GRC) (Indu et al., 2018; Zhang, Zheng, Li, Li, & Li, 2016). 1 | Engineering and Technology 5

  6. Tutors India Lab Identity & access management systems (IAM) Identity & access management systems (IAM) First, the term IM is a process of managing, creating using identities and infrastructure which offered support for these processes. Also, it is capable of performing functions like discovery, policy en- forcement, information exchange, administration, maintenance, management and data authentication. Each application or person identified through cre- dential that denotes a group of attributes, delivered through reliable resources (Werner et al., 2017). To ensure the security in IAM, the data’s are ap- proved and managed by the same identity for entire applications. It is used to validate the data users, services or devices as well as have rights to access or deny data. Moreover, it does not need its own authentication or identity to authenticate the data (Indu et al., 2018). The IAM simplifies the manage- ment of large-scale distributed systems which mini- mizes the application workload. 1 | Engineering and Technology 6

  7. Tutors India Lab FUTURE SCOPE From the above points, we concluded that there is a need for effective key-based authentication to enhance the performance of flexible management for both multiple users and cloud system. Also required authorization policies for multi-party cloud infrastructure data sharing as it offers flexible and dynamic operations. SUMMARY This section summarized and analysed the recent security, mitigations and potential threats aspects in cloud system along with the significance of data access management, identity management, services and security concern. From this we found there is a need for effective IAM mechanism for development of secure and flexible management policies which will enhance the system performance in both security and privacy concern. 1 | Engineering and Technology 7

  8. Tutors India Lab ABOUT THE DEPARTMENT REFERENCES * Engineering and Technology Lab at Tutors India is involved in exploring novel research areas for the challenges faced by today’s technology-oriented business or organisation, the market, the economy, finance and sales. The research team explores and identifies troubling questions that exist in schol- arly literature, in theory, or in practices that needs deliberate investigation. Butun, I., Erol-Kantarci, M., Kantarci, B., & Song, H. (2016). Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communi- cations Magazine, 54(4), 47–53. https://doi.org/10.1109/ MCOM.2016.7452265 * Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., & Huang, X. (2015). Hierarchical and Shared Access Control. IEEE Transactions on Information Forensics and Security, 11(4), 850–865. https://doi.org/10.1109/ TIFS.2015.2512533 * Eludiora, S., Abiona, O., Oluwatope, A., Oluwaranti, A., Onime, C., & Kehinde, L. (2011). A User Identity Management Protocol for Cloud Computing Paradigm. International Journal of Com- munications, Network and System Sciences, 04(03), 152–163. https://doi.org/10.4236/ijcns.2011.43019 ABOUT US * Indu, Anand, R., & Bhaskar, V. (2018). Identity and access man- agement in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 21(4), 574–588. https://doi.org/10.1016/j.jestch.2018.05.010 Tutors India, is world’s reputed academic guidance provider for have guided more than 4,500 Ph.D. scholars and 10,500 Masters Students across the globe. We support students, research scholars, entrepreneurs, and profes- sionals from various organizations in providing consistently high-quality writing and data analytical services every time. We value every client and make sure their requirements are identified and understood by our special- ized professionals and analysts, enriched in experience to deliver technically sound output within the requested timeframe. Writers at Tutors India are best referred as ‘Researchers’ since every topic they handle unique and challeng- ing. We specialize in handling text and data, i.e., content development and Statistical analysis where the latest statistical applications are exhausted by our expert analysts for determining the outcome of the data analysed. Qualified and experienced researchers including Ph.D. holders, statisticians, and research analysts offer cutting edge research consulting and writing services to meet your business information or academic project requirement. Our expertise has passion towards research and personal assistance as we work closely with you for a very professional and quality output within your stipulated time frame. Our services cover vast areas, and we also support either part or entire research paper/service as per your requirement at competitive prices. * Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. ur R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651. https://doi.org/10.1007/ s11227-013-1055-z * Legillon, F., Melab, N., Renard, D., & Talbi, E.-G. (2013). Cost minimization of service deployment in a multi-cloud environ- ment. In 2013 IEEE Congress on Evolutionary Computation (pp. 2580–2587). IEEE. https://doi.org/10.1109/CEC.2013.6557880 * Oliveira, de C. J., Trinta, F., Vieira, D., & Cortes, O. A. C. (2018). Evolutionary solutions for resources management in multiple clouds: State-of-the-art and future directions. Future Genera- tion Computer Systems, 88, 284–296. https://doi.org/10.1016/j. future.2018.05.087 * Singh, A., & Chatterjee, K. (2015). Identity Management in Cloud Computing through Claim-Based Solution. In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (pp. 524–529). IEEE. https://doi. org/10.1109/ACCT.2015.89 * Singh, S., Jeong, Y.-S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200–222. https://doi. org/10.1016/j.jnca.2016.09.002 * Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi. org/10.1016/j.jnca.2010.07.006 * Werner, J., Westphall, C. M., & Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122, 29–42. https://doi.org/10.1016/j. comnet.2017.04.030 * Zhang, Y., Zheng, D., Li, Q., Li, J., & Li, H. (2016). Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Security and Communi- cation Networks, 9(16), 3688–3702. https://doi.org/10.1002/ sec.1574 Format Type : E-Book Copyright © 2001 - 2019 Tutors India All Rights Reserved. No part of this document should be modified/used without prior consent. Cell:+91-4448137070 Web:www.tutorsindia.com Email:info@tutorsindia.com 1 | Engineering and Technology

More Related