Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Cloud Identity and Access Management – A Model Proposal

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      Novateur Publication
    • الموضوع:
      2019
    • Collection:
      neliti (Indonesia's Think Tank Database)
    • نبذة مختصرة :
      This paper discusses the application of cloud identity and access management in digital transformation and cloud adoption. Cloud computing refers to a fusion of various technologies, including grid computing and distributed computing, that makes use of the Internet as a service delivery network [1]. Organizations need the ability to choose the services and pricing models that best meet their needs, and budgetary constraints. It is the cloud service providers that set the price model for their cloud services, considering factors like instance size, utilization size (per hour), users' size (per user), infrastructure size (per hour), and service size (per service). The majority of businesses are hosting or implementing web services in a cloud infrastructure for the convenience of administration and increased availability [1]. Multi-tenant setups are also utilized in cloud-based services to reduce the cost considerations associated with the services. To accomplish multi-tenancy in the cloud, virtual environments are utilized. A vulnerability in virtual machines poses a direct danger to the privacy and security of the people who are using them [2]. Security problems in cloud web services are found in particular areas such as authentication, authorization, data protection, and accountability, among other things. Cloud security is critical to business and technology sustainability. Even though the "trust boundary" is largely static and monitored and managed by the IT unit in a centralized company where functionality is being implemented within the perimeter of the company, the trust limit becomes dynamic and moves beyond IT command with the adoption of cloud computing [3]. A company's servers, systems, and applications boundaries will expand into the service provider domains. In addition, this loss of control poses a threat to the existing trusted governance and management paradigm, and it has the potential to impede the adoption of cloud services inside an organization if it is not handled correctly. Modern ...
    • File Description:
      application/pdf
    • Relation:
      https://www.neliti.com/publications/429339/cloud-identity-and-access-management-a-model-proposal
    • Rights:
      (c) International Journal of Innovations in Engineering Research and Technology, 2019
    • الرقم المعرف:
      edsbas.559CF034