Visible to the public A policy-based identity management schema for managing accesses in clouds

TitleA policy-based identity management schema for managing accesses in clouds
Publication TypeConference Paper
Year of Publication2017
AuthorsMoghaddam, F. F., Wieder, P., Yahyapour, R.
Conference Name2017 8th International Conference on the Network of the Future (NOF)
Date PublishedNov. 2017
PublisherIEEE
ISBN Number978-1-5386-0554-7
KeywordsAccess Control, authentication, cloud computing, Computational modeling, Identity management, policy, Policy Mapping, pubcrawl, reliability, Scalability, scalable, Scalable Security, security, Servers, user authentication
Abstract

Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. Lack of coincidence in identity management models based on defined policies and various security levels in different cloud servers is one of the most challenging issues in clouds. In this paper, a policy- based user authentication model has been presented to provide a reliable and scalable identity management and to map cloud users' access requests with defined polices of cloud servers. In the proposed schema several components are provided to define access policies by cloud servers, to apply policies based on a structural and reliable ontology, to manage user identities and to semantically map access requests by cloud users with defined polices. Finally, the reliability and efficiency of this policy-based authentication schema have been evaluated by scientific performance, security and competitive analysis. Overall, the results show that this model has met defined demands of the research to enhance the reliability and efficiency of identity management in cloud computing environments.

URLhttps://ieeexplore.ieee.org/document/8251226/
DOI10.1109/NOF.2017.8251226
Citation Keymoghaddam_policy-based_2017