Skip to main content

Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture

  • Conference paper
  • First Online:
Cryptology and Network Security with Machine Learning (ICCNSML 2023)

Abstract

Cloud computing environment combines a variety of networked devices to facilitate the provision of requested services. 8–9% challenges related to cloud are due to identity and access management. Numerous academics and industry experts have diligently tackled the challenges associated with ensuring secure access to cloud resources. It constitutes a core element of cloud security and assumes a pivotal role in the protection of data and assets housed and handled within cloud ecosystems. Identity management is used to authorization of registered users or customers and access management is used to provide access to user of data and services provided by cloud. Various identity management and access management protocols are compared in this research paper. Need of Zero Trust Architecture has been analyzed. Two major access management schemes are implemented with 10 roles and 18 polices using Zero Trust Architecture and its results shows the improvement in security performance of cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Siddiqui Z, Tayan O, Khurram Khan M (2018) Security analysis of smartphone and cloud computing authentication frameworks and protocols. IEEE Access 6:34527–34542

    Google Scholar 

  2. Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6(1)

    Google Scholar 

  3. Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420–147452

    Article  Google Scholar 

  4. Ahmad Z, Jehangiri AI, Alaanzy MA, Othman M, Latip R, Zaman SKU, Umar AI (2021) Scientific workflows management and scheduling in cloud computing: taxonomy, prospects, and challenges. IEEE Access 9:53491–53508

    Article  Google Scholar 

  5. Wang H, Yi X, Bertino E, Sun L (2014) Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Exp 28(3):600–615

    Article  Google Scholar 

  6. Kumar PS (2020) Multi authority access control mechanism for secure cloud storage. Int J Cloud Comput Database Manage 1(2):07–10

    Article  Google Scholar 

  7. Hahn C, Kim J, Kwon H, Hur J (2022) Efficient IoT management with resilience to unauthorized access to cloud storage. IEEE Trans Cloud Comput 10(2):1008–1020

    Article  Google Scholar 

  8. Sharma D, Kumar G, Sharma R (2021) Analysis of heterogeneous data storage and access control management for cloud computing under M/M/c queueing model. Int J Cloud Appl Comput 11(3):58–71

    Google Scholar 

  9. Oh SM, Ashiquzzaman A, Lee D (2019) A survey on virtualized platform for multi-access edge computing (MEC) technology. Int J Private Cloud Comput Environ Manage 6(1):1–18

    Google Scholar 

  10. Zhou Z, Wu L, Hong Z (2013) Context-aware access control model for cloud computing. Int J Grid Distrib Comput 6(6):1–12

    Article  Google Scholar 

  11. Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput 9(1):33–49

    Google Scholar 

  12. Amoon M (2016) Adaptive framework for reliable cloud computing environment. IEEE Access 4:9469–9478

    Article  Google Scholar 

  13. Günther J, Praeg CP (2023) Significance and management of cloud computing, multi-cloud and cloud brokerage in companies. HMD Praxis Der Wirtschaftsinformatik

    Google Scholar 

  14. Sun P (2020) Research on cloud computing service based on trust access control. Int J Eng Bus Manage 12:184797901989744

    Article  Google Scholar 

  15. Jain T (2017) Secure big data access control policies for cloud computing environment. Int J Innov Res Comput Sci Technol 5(2):253–256

    Article  Google Scholar 

  16. Chadwick DW, Casenove M, Siu K (2013) My private cloud—granting federated access to cloud resources. J Cloud Comput Adv Syst Appl 2(1):3

    Article  Google Scholar 

  17. Alsirhani A, Ezz M, Mohamed Mostafa A (2022) Advanced authentication mechanisms for identity and access management in cloud computing. Comput Syst Sci Eng 43(3):967–984

    Google Scholar 

  18. Rizvi S, Mitchell J (2016) A new access control scheme for protecting distributed cloud services and resources. Serv Trans Cloud Comput 4(3):28–41

    Google Scholar 

  19. Zhang Y, Li J, Chen X, Li H (2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing. Sec Commun Netw 9(14):2397–2411

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinay Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yadav, V., Soni, M.K., Pratap, A. (2024). Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0641-9_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0640-2

  • Online ISBN: 978-981-97-0641-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics