Identity and Access Management in Cloud Computing

  • Khandakar Entenam Unayes AhmedEmail author
  • Vassil Alexandrov
Part of the Computer Communications and Networks book series (CCN)


With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5% of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet today’s business needs in the Cloud environment, remains one of the major hurdles for enterprises’ adoption of Cloud services. Today’s aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.


Cloud Computing Access Control Cloud Provider Cloud Service Provider Trust Third Party 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kumaraswamy, S., Lakshminarayanan, L., Reiter, M., Stein, J., Wilson, Y.: Guidance for Identity & Access Management V2.1. Cloud Security Alliance (CSE), April 2010. Online: (2010). Last access 10 Oct 2010
  2. 2.
    Courtney M.: How mature cloud computing. Online: (2010). Last access 24 Dec 2010
  3. 3.
    Cloud Computing Market – Global Forecast (2010–2015): Online: (2010). Last access 1 Jan 2011
  4. 4.
    Cloud Computing Market – Global Forecast (2010–2015): Online: (2010). Last access 29 Dec 2010
  5. 5.
    Christiansen C., Kolodgy C., Hudson S., Pintal G.: Identity and access management for approaching clouds [white paper]. Online: (2010). Last access 22 Dec 2010
  6. 6.
    Li, D., Liu, C., Wei, Q., Liu, Z., Liu, B.: RBAC-based access control for SaaS systems. In: The proceedings of 2010 2nd International Conference on Information Engineering and Computer Science (ICIECS), Wuhan, pp. 1–4. doi:10.1109/ICIECS.2010.5.678213 (2010)
  7. 7.
    Albeshri., A., Caelli, W.: Mutual protection in cloud computing environment. In: The proceedings of 2010 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, pp. 641–646. doi:10.1109/HPCC.2010.87 (2010)
  8. 8.
    Ranchal, R., Bhargava, B., Othmane, L., Lilien, L.: Protection of identity information in cloud computing without trusted third party. In: The proceedings of 2010 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, pp. 368–372 (2010)Google Scholar
  9. 9.
    Sharma, A.: Cloud computing and open source, May 2010. Online: (2010). Last access 11 Nov 2010
  10. 10.
    Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for on-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, IL, May 1988, pp 1–10 (1988)Google Scholar
  11. 11.
    Kumaraswamy, S., Lakshminarayanan, S., Reiter, M., Stein, J., Wilson, Y.: Domain 12: Guidance for Identity & Access Management V2.1. Cloud Security Alliance. Online: (2010). Last access 2 Oct 2010
  12. 12.
    Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), RFC 2409. IETF Network Working Group. Online: (1998). Last access 12 Jan 2011
  13. 13.
    Ricciardi, F., MIT Kerberos Consortium: Kerberos protocol tutorial. Online: (2007). Last access 22 Dec 2010
  14. 14.
    SANS Institute InfoSec Reading Room: A review of the Diffie-Hellman algorithm and its use in secure internet protocols. Online: (2001). Last access 12 Jan 2011Google Scholar
  15. 15.
    Rescorla, E.: Diffie-Hellman key agreement method, RFC 2631. IETF Network Working Group. Online: (1999)
  16. 16.
    RSA Laboratories, RSA Laboratories’: FAQ about today’s cryptography, version 4.1. RSA Security Inc., 2000. Online: (2000). Last access 12 Dec 2010
  17. 17.
    Benjamin, L.: Diffie-Hellman method for key agreement. Online: (1997). Last access 22 Dec 2010
  18. 18.
    RSA Laboratories: PKCS #3: Diffie-Hellman key-agreement standard, version 1.4. Revised Nov 1, 1993. Online: (1993). Last access 27 Jan 2011
  19. 19.
    Tutorial Point: Web Services behavioural characteristics. Online: (2011). Last access 17 Jan 2011
  20. 20.
    Xuelei, W., Jia, C., Bilan, R.: Web Service architecture and application research. In: International Conference on E-Business and Information System Security, 2009 (EBISS ’09), 23–24 May 2009, pp. 1–5. doi: 10.1109/EBISS.2009.5138146 (2009)
  21. 21.
    Ahmed, K.E.U.: Developing a prototype of identity and access management. Research Project in ACET Center, University of Reading, Reading (2011). 28 Feb 2011Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  • Khandakar Entenam Unayes Ahmed
    • 1
    Email author
  • Vassil Alexandrov
    • 2
  1. 1.School of Electrical & Computer EngineeringRMIT UniversityMelbourneAustralia
  2. 2.ICREA Research Professor in Computational Science at Barcelona Supercomputing CentreBarcelonaSpain

Personalised recommendations