Abstract
Cloud computing environment combines a variety of networked devices to facilitate the provision of requested services. 8–9% challenges related to cloud are due to identity and access management. Numerous academics and industry experts have diligently tackled the challenges associated with ensuring secure access to cloud resources. It constitutes a core element of cloud security and assumes a pivotal role in the protection of data and assets housed and handled within cloud ecosystems. Identity management is used to authorization of registered users or customers and access management is used to provide access to user of data and services provided by cloud. Various identity management and access management protocols are compared in this research paper. Need of Zero Trust Architecture has been analyzed. Two major access management schemes are implemented with 10 roles and 18 polices using Zero Trust Architecture and its results shows the improvement in security performance of cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Siddiqui Z, Tayan O, Khurram Khan M (2018) Security analysis of smartphone and cloud computing authentication frameworks and protocols. IEEE Access 6:34527–34542
Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6(1)
Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420–147452
Ahmad Z, Jehangiri AI, Alaanzy MA, Othman M, Latip R, Zaman SKU, Umar AI (2021) Scientific workflows management and scheduling in cloud computing: taxonomy, prospects, and challenges. IEEE Access 9:53491–53508
Wang H, Yi X, Bertino E, Sun L (2014) Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Exp 28(3):600–615
Kumar PS (2020) Multi authority access control mechanism for secure cloud storage. Int J Cloud Comput Database Manage 1(2):07–10
Hahn C, Kim J, Kwon H, Hur J (2022) Efficient IoT management with resilience to unauthorized access to cloud storage. IEEE Trans Cloud Comput 10(2):1008–1020
Sharma D, Kumar G, Sharma R (2021) Analysis of heterogeneous data storage and access control management for cloud computing under M/M/c queueing model. Int J Cloud Appl Comput 11(3):58–71
Oh SM, Ashiquzzaman A, Lee D (2019) A survey on virtualized platform for multi-access edge computing (MEC) technology. Int J Private Cloud Comput Environ Manage 6(1):1–18
Zhou Z, Wu L, Hong Z (2013) Context-aware access control model for cloud computing. Int J Grid Distrib Comput 6(6):1–12
Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput 9(1):33–49
Amoon M (2016) Adaptive framework for reliable cloud computing environment. IEEE Access 4:9469–9478
Günther J, Praeg CP (2023) Significance and management of cloud computing, multi-cloud and cloud brokerage in companies. HMD Praxis Der Wirtschaftsinformatik
Sun P (2020) Research on cloud computing service based on trust access control. Int J Eng Bus Manage 12:184797901989744
Jain T (2017) Secure big data access control policies for cloud computing environment. Int J Innov Res Comput Sci Technol 5(2):253–256
Chadwick DW, Casenove M, Siu K (2013) My private cloud—granting federated access to cloud resources. J Cloud Comput Adv Syst Appl 2(1):3
Alsirhani A, Ezz M, Mohamed Mostafa A (2022) Advanced authentication mechanisms for identity and access management in cloud computing. Comput Syst Sci Eng 43(3):967–984
Rizvi S, Mitchell J (2016) A new access control scheme for protecting distributed cloud services and resources. Serv Trans Cloud Comput 4(3):28–41
Zhang Y, Li J, Chen X, Li H (2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec Commun Netw 9(14):2397–2411
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yadav, V., Soni, M.K., Pratap, A. (2024). Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_47
Download citation
DOI: https://doi.org/10.1007/978-981-97-0641-9_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0640-2
Online ISBN: 978-981-97-0641-9
eBook Packages: EngineeringEngineering (R0)