International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Identity and Access Management in Cloud Security: A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption |
|---|---|
| ABSTRACT | Identity and Access Management in Cloud Security: A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption |
| AUTHOR | SAAD KHAN |
| VOLUME | 20 |
| DOI | 10.15680/IJIRCCE.2019. 0702161 |
| pdf/161_Identity and Access Management in Cloud Security A Study on Federated Identity, Single Sign-on (SSO), and Multi-Factor Authentication for Secure Cloud Adoption.pdf | |
| KEYWORDS | |
| References | 1. Alotaibi, S., & Alalwan, N. (2017). Single sign-on authentication in cloud computing: An overview. IEEE Access, 5, 12361–12373. https://doi.org/10.1109/ACCESS.2017.2702391 2. Bhatti, R., Bertino, E., & Ghafoor, A. (2014). A trust-based context-aware access control model for federated cloud computing. IEEE Transactions on Dependable and Secure Computing, 11(5), 441–454. https://doi.org/10.1109/TDSC.2013.46 3. Celesti, A., Fazio, M., & Villari, M. (2016). Enabling secure discovery in federated cloud computing. Future Generation Computer Systems, 55, 856–867. https://doi.org/10.1016/j.future.2015.09.018 4. Chadwick, D. W., & Fatema, K. (2012). A privacy preserving authorisation system for the cloud. Proceedings of the 5th International Conference on Cloud Computing, 123–130. https://doi.org/10.1109/CLOUD.2012.49 5. Dmitrienko, A., Noack, D., & Yung, M. (2017). Secure wallet-assisted offline Bitcoin payments with double-spender revocation. IEEE Transactions on Information Forensics and Security, 12(10), 2315–2330. https://doi.org/10.1109/TIFS.2016.2639341 6. Indu, I., Rubanya, P. M., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Journal of Network and Computer Applications, 110, 54–72. https://doi.org/10.1016/j.jnca.2018.03.002 7. Naor, M., Shan, G., & Orbach, M. (2018). The security of authentication: A user study of perceptions of security and usability of authentication methods. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. https://doi.org/10.1145/3173574.3173952 8. Sun, S. T., & Beznosov, K. (2015). The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 123–134. https://doi.org/10.1109/SP.2015.32 9. Cloud Security Alliance. (2018). CSA enterprise survey 2018. https://cloudsecurityalliance.org/research 10. Gartner. (2018). Magic quadrant for access management. https://www.gartner.com 11. Ponemon Institute. (2018). Cost of a data breach study. https://www.ponemon.org 12. Verizon. (2018). Data breach investigations report. https://www.verizon.com/dbir 13. NIST. (2018). National vulnerability database. https://nvd.nist.gov 14. OWASP. (2017). OWASP top 10. https://owasp.org 15. ISACA. (2018). State of cybersecurity report. https://www.isaca.org 16. SAML. (2018). SAML 2.0 specification. https://docs.oasis-open.org 17. OAuth. (2018). OAuth 2.0 framework. https://oauth.net 18. OpenID. (2018). OpenID connect. https://openid.net 19. Kerberos. (2018). MIT Kerberos documentation. https://web.mit.edu/kerberos 20. Shibboleth. (2018). Shibboleth consortium. https://www.shibboleth.net 21. Auth0. (2018). Identity platform documentation. https://auth0.com 22. XACML. (2018). OASIS XACML standard. https://www.oasis-open.org 23. ABAC. (2018). NIST ABAC guidelines. https://nvlpubs.nist.gov 24. TPM. (2018). Trusted computing group specifications. https://trustedcomputinggroup.org 25. FIDO. (2018). FIDO alliance standards. https://fidoalliance.org |