Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management

Print
PDF
IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology
© 2017 by IJCA Journal
ICQUEST 2016 - Number 3
Year of Publication: 2017
Authors:
Snehal Gaikwad
Pragati Patil Bedekar

Snehal Gaikwad and Pragati Patil Bedekar. Article: A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management. IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology ICQUEST 2016(3):14-18, August 2017. Full text available. BibTeX

@article{key:article,
	author = {Snehal Gaikwad and Pragati Patil Bedekar},
	title = {Article: A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management},
	journal = {IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology},
	year = {2017},
	volume = {ICQUEST 2016},
	number = {3},
	pages = {14-18},
	month = {August},
	note = {Full text available}
}

Abstract

To achieve operational excellence in today's IT platform continuous to become even more difficult. The security of the data amongst which suffers the most or can say is very vulnerable to the attacks. Also the storage space of the particular data these days also is becoming the major issue in current scenario. So to maintain the Integrity of the data or the work of the user need to be made maintain, these days it is seen that the lot of storage in cloud which gives, a chance of using Cloud technology in good way, but also it need to ensure the security in this part. So to maintain the confidentiality of the data in this paper the sharing of files using the cloud technology is useful. Which is done by the proper Authentication of the users as well as the Availability of the stored data at the cloud storage? Also there are many ways to improve the security in the inter-cloud to achieve the secured sharing and to maintain the identity of the data of different users at one single place.

References

  • D. Chappell, "A Short Introduction to Cloud Platforms an Enterprise—Oriented View," Chappell and Association, San Francisco, 2008, pp. 1-13.
  • T. B. Winans and J. S. Brown, "Cloud Computing: A Collection of Working Papers," Deloitte Consulting LLP, New York, pp. 1-27.
  • Stratus Technologies, "Server Virtualization and Cloud Computing: Four Hidden Impacts on Uptime and Availability, "A White Paper by Startus Technology, June 2009
  • Oracle, "Architectural Strategies for Cloud Computing," An Oracle White Paper in Enterprise Architecture, August 2009
  • G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, "Cloud Computing," IBM Corporation, New York, August 2007.
  • NIST, January 2010. http://www. nist. gov/
  • P. Mell and T. Grace, "Effectively and Securely: Using the Cloud Computer Paradigm, "NITS, Information Technology Laboratory, Boulder, and December 2009. "
  • The European Network and Information Security Agency (ENISA), "Cloud Computing: Benefits, Risks and Recommendations for Information Security," November 2009.
  • Juniper Networks, "Implementation Identity Federation in a Hybrid Cloud Computing Environment Solution Guide," October 2009.
  • P. Bryden, D. C. Kirkpatrick and F. Moghadami, "Security Authorization: An Approach for Community Cloud Computing Environments White Paper, November 2009.
  • Gartner, "Assessing the Security Risks of Cloud Computing,"2009.
  • S. So, "Cloud Computing and Information ecurity,"Info-Security Project, No. 3, May 2009.
  • G. Treu, F. Fuchs and C. Dargatz, "Implicit Authorization for Social Location Disclosure," Journal of Software, Vol. 3, No. 1, 2008, pp. 18-26.
  • M. E. Whiteman and H. J. Mattord, "Principles of Information Security," 2nd Edology, Massachusetts, 2005.
  • P. Venkataram and B. S. Babu, "An Authentication Scheme for Ubiquitous Commerce: A Cognitive Agents Based Approach," Proceedings of IEEE Workshops on Network Operations and Management Symposium Workshops, Salvador da Bahia, 7-11 April 2008, pp. 248-256.
  • A. Gopalakrishnan, "Cloud Computing Identity Management, "SET Labs Briefings, Vol. 7, No. 7, 2009 pp. 45- 54.