Naoufal Ben Bouazza
Surveying the challenges and requirements for identity in the cloud
Ben Bouazza, Naoufal; Lemoudden, Mouad; El Ouahidi, Bouabid
Abstract
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.
Citation
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014). Surveying the challenges and requirements for identity in the cloud. In Proceedings of the 4th Edition of National Security Days (JNS4). https://doi.org/10.1109/jns4.2014.6850127
Conference Name | 2014 4th Edition of National Security Days (JNS4) |
---|---|
Conference Location | Tetuan, Morocco |
Start Date | May 12, 2014 |
End Date | May 13, 2014 |
Online Publication Date | Jul 10, 2014 |
Publication Date | 2014-05 |
Deposit Date | Feb 28, 2023 |
Publisher | Institute of Electrical and Electronics Engineers |
Book Title | Proceedings of the 4th Edition of National Security Days (JNS4) |
DOI | https://doi.org/10.1109/jns4.2014.6850127 |
You might also like
Attacking Windows Hello for Business: Is It What We Were Promised?
(2023)
Journal Article
Hybrid Email Spam Detection Model Using Artificial Intelligence
(2020)
Journal Article
Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks
(2019)
Conference Proceeding
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming
(2017)
Journal Article
An approach for meteorological data integration and stream processing
(2016)
Conference Proceeding