International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Identity and Access Management in Cloud Security: A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption
ABSTRACT Identity and Access Management in Cloud Security: A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption
AUTHOR SAAD KHAN
VOLUME 20
DOI 10.15680/IJIRCCE.2019. 0702161
PDF pdf/161_Identity and Access Management in Cloud Security A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption.pdf
KEYWORDS
References 1. Alotaibi, S., & Alalwan, N. (2017). Single sign-on authentication in cloud computing: An overview. IEEE Access, 5, 12361–12373. https://doi.org/10.1109/ACCESS.2017.2702391
2. Bhatti, R., Bertino, E., & Ghafoor, A. (2014). A trust-based context-aware access control model for federated cloud computing. IEEE Transactions on Dependable and Secure Computing, 11(5), 441–454. https://doi.org/10.1109/TDSC.2013.46
3. Celesti, A., Fazio, M., & Villari, M. (2016). Enabling secure discovery in federated cloud computing. Future Generation Computer Systems, 55, 856–867. https://doi.org/10.1016/j.future.2015.09.018
4. Chadwick, D. W., & Fatema, K. (2012). A privacy preserving authorisation system for the cloud. Proceedings of the 5th International Conference on Cloud Computing, 123–130. https://doi.org/10.1109/CLOUD.2012.49
5. Dmitrienko, A., Noack, D., & Yung, M. (2017). Secure wallet-assisted offline Bitcoin payments with double-spender revocation. IEEE Transactions on Information Forensics and Security, 12(10), 2315–2330. https://doi.org/10.1109/TIFS.2016.2639341
6. Indu, I., Rubanya, P. M., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Journal of Network and Computer Applications, 110, 54–72. https://doi.org/10.1016/j.jnca.2018.03.002
7. Naor, M., Shan, G., & Orbach, M. (2018). The security of authentication: A user study of perceptions of security and usability of authentication methods. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. https://doi.org/10.1145/3173574.3173952
8. Sun, S. T., & Beznosov, K. (2015). The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 123–134. https://doi.org/10.1109/SP.2015.32
9. Cloud Security Alliance. (2018). CSA enterprise survey 2018. https://cloudsecurityalliance.org/research
10. Gartner. (2018). Magic quadrant for access management. https://www.gartner.com
11. Ponemon Institute. (2018). Cost of a data breach study. https://www.ponemon.org
12. Verizon. (2018). Data breach investigations report. https://www.verizon.com/dbir
13. NIST. (2018). National vulnerability database. https://nvd.nist.gov
14. OWASP. (2017). OWASP top 10. https://owasp.org
15. ISACA. (2018). State of cybersecurity report. https://www.isaca.org
16. SAML. (2018). SAML 2.0 specification. https://docs.oasis-open.org
17. OAuth. (2018). OAuth 2.0 framework. https://oauth.net
18. OpenID. (2018). OpenID connect. https://openid.net
19. Kerberos. (2018). MIT Kerberos documentation. https://web.mit.edu/kerberos
20. Shibboleth. (2018). Shibboleth consortium. https://www.shibboleth.net
21. Auth0. (2018). Identity platform documentation. https://auth0.com
22. XACML. (2018). OASIS XACML standard. https://www.oasis-open.org
23. ABAC. (2018). NIST ABAC guidelines. https://nvlpubs.nist.gov
24. TPM. (2018). Trusted computing group specifications. https://trustedcomputinggroup.org
25. FIDO. (2018). FIDO alliance standards. https://fidoalliance.org
image
Copyright © IJIRCCE 2020.All right reserved