CFP last date
22 April 2024
Reseach Article

A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management

Published on August 2017 by Snehal Gaikwad, Pragati Patil Bedekar
International Conference on Quality Up-gradation in Engineering Science and Technology
Foundation of Computer Science USA
ICQUEST2016 - Number 3
August 2017
Authors: Snehal Gaikwad, Pragati Patil Bedekar
d85bafc6-afe0-4889-bf83-083e12f9213d

Snehal Gaikwad, Pragati Patil Bedekar . A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management. International Conference on Quality Up-gradation in Engineering Science and Technology. ICQUEST2016, 3 (August 2017), 14-18.

@article{
author = { Snehal Gaikwad, Pragati Patil Bedekar },
title = { A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management },
journal = { International Conference on Quality Up-gradation in Engineering Science and Technology },
issue_date = { August 2017 },
volume = { ICQUEST2016 },
number = { 3 },
month = { August },
year = { 2017 },
issn = 0975-8887,
pages = { 14-18 },
numpages = 5,
url = { /proceedings/icquest2016/number3/28140-1685/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Quality Up-gradation in Engineering Science and Technology
%A Snehal Gaikwad
%A Pragati Patil Bedekar
%T A Survey on Designing a Framework for Improving Security for Cloud using Inter-cloud Identity Management
%J International Conference on Quality Up-gradation in Engineering Science and Technology
%@ 0975-8887
%V ICQUEST2016
%N 3
%P 14-18
%D 2017
%I International Journal of Computer Applications
Abstract

To achieve operational excellence in today's IT platform continuous to become even more difficult. The security of the data amongst which suffers the most or can say is very vulnerable to the attacks. Also the storage space of the particular data these days also is becoming the major issue in current scenario. So to maintain the Integrity of the data or the work of the user need to be made maintain, these days it is seen that the lot of storage in cloud which gives, a chance of using Cloud technology in good way, but also it need to ensure the security in this part. So to maintain the confidentiality of the data in this paper the sharing of files using the cloud technology is useful. Which is done by the proper Authentication of the users as well as the Availability of the stored data at the cloud storage? Also there are many ways to improve the security in the inter-cloud to achieve the secured sharing and to maintain the identity of the data of different users at one single place.

References
  1. D. Chappell, "A Short Introduction to Cloud Platforms an Enterprise—Oriented View," Chappell and Association, San Francisco, 2008, pp. 1-13.
  2. T. B. Winans and J. S. Brown, "Cloud Computing: A Collection of Working Papers," Deloitte Consulting LLP, New York, pp. 1-27.
  3. Stratus Technologies, "Server Virtualization and Cloud Computing: Four Hidden Impacts on Uptime and Availability, "A White Paper by Startus Technology, June 2009
  4. Oracle, "Architectural Strategies for Cloud Computing," An Oracle White Paper in Enterprise Architecture, August 2009
  5. G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, "Cloud Computing," IBM Corporation, New York, August 2007.
  6. NIST, January 2010. http://www. nist. gov/
  7. P. Mell and T. Grace, "Effectively and Securely: Using the Cloud Computer Paradigm, "NITS, Information Technology Laboratory, Boulder, and December 2009. "
  8. The European Network and Information Security Agency (ENISA), "Cloud Computing: Benefits, Risks and Recommendations for Information Security," November 2009.
  9. Juniper Networks, "Implementation Identity Federation in a Hybrid Cloud Computing Environment Solution Guide," October 2009.
  10. P. Bryden, D. C. Kirkpatrick and F. Moghadami, "Security Authorization: An Approach for Community Cloud Computing Environments White Paper, November 2009.
  11. Gartner, "Assessing the Security Risks of Cloud Computing,"2009.
  12. S. So, "Cloud Computing and Information ecurity,"Info-Security Project, No. 3, May 2009.
  13. G. Treu, F. Fuchs and C. Dargatz, "Implicit Authorization for Social Location Disclosure," Journal of Software, Vol. 3, No. 1, 2008, pp. 18-26.
  14. M. E. Whiteman and H. J. Mattord, "Principles of Information Security," 2nd Edology, Massachusetts, 2005.
  15. P. Venkataram and B. S. Babu, "An Authentication Scheme for Ubiquitous Commerce: A Cognitive Agents Based Approach," Proceedings of IEEE Workshops on Network Operations and Management Symposium Workshops, Salvador da Bahia, 7-11 April 2008, pp. 248-256.
  16. A. Gopalakrishnan, "Cloud Computing Identity Management, "SET Labs Briefings, Vol. 7, No. 7, 2009 pp. 45- 54.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Availability Cloud Computing Confidentiality Identity Integrity Management.