NEED A PERFECT PAPER? PLACE YOUR FIRST ORDER AND SAVE 15% USING COUPON:

Identity and Access Management (IAM)

[ad_1]

Naren Work:

 

Identity and Access Management (IAM)

Organizations and business firms have developed software to gain more users of their services through cloud computing services. “Cloud computing is a nascent and rapidly evolving model, with new aspects and capabilities being added regularly by researchers around the world” (Sharma et al., 2016). However, the security of these applications should be closely monitored to prevent attacks from cybercriminals. Confidential information such as user credentials should be stored and managed to avoid interference from cyber threats. Applications that are used globally must be integrated to offer the same purpose to its clients.  However, enterprise applications face significant risks, both internal because there are multiple data to be managed. These threats have become a considerable challenge to business firms because many funds are needed to manage and simultaneously monitor data (Sharma et al., 2016).

Software and application developers have been deploying identity and access management (IAM) knowledge to support their systems’ security. IAM will ensure that only authorized persons get access to services, thereby building the availability of information in the cloud, confidentiality, and integrity to their users.  Access control is generally needed in different layers of a cloud computing domain. These layers include the application layer, system layer, network layer, process layer, and the data layer. However, IAM can be used to integrate into systems through consolidation identities in the respective applications. “It is essential that IAM solutions address the issues related to identities that can be used in multiple contexts, across multiple security domains” (Waters, 2016).

Recently, most people use cloud-based IAM without realizing it by using a trusted identity. For example, a person may log in to another application using Mail or even Facebook credentials. However, the IAM manager and IAM core are usually implemented in different virtual machines. Before a service is offered, a person is required to first register. The registration identifier is stored in a MySQL database in an encrypted format. The encryption format provides confidentiality of the user’s credentials as even the developer will not access the information. In particular, the user password is usually kept in the encrypted form in order for it not to be visible to anyone. The cloud service provider is not exempted either.

Business enterprises have migrated to the used of cloud-based services, including the management of user information.  On the other hand, cloud developers have made some well-paid amounts of profit by offering their services to business organizations. “No matter the estimate, it is proving to be a lucrative business for cloud providers who offer IAM (or IDaaS) as a cloud-based solution” (Waters, 2016). The leading solutions cloud developers benefit from are managing the identities confidential to both the user and the firm or provider. External identity providers are considerably associated with federal identity. Maintaining federal identity is archived by linking an individual’s electronic identity to its corresponding attribute data.

In conclusion, cloud IAM is still maturing in day to day activities. This implies a need to consolidate all identities in an automatic style — standardization of these IAM frameworks using protocols and improving authentication methods used. The main goal of using cloud IAM is building trust between the provider and the user of the service. This is because only the administration acts as an independent sphere of influence in a Cloud-based architecture. “Cloud providers act as single and isolated domains” (Kecskemeti, 2016). However, the automated process enables the execution of services to its consumers in real-time, minimizing the costs.

 

References

Kecskemeti, G. (2016). Developing Interoperable and Federated Cloud Architecture. Retrieved from https://www.igi-global.com/book/developing-interoperable-federated-cloud-architecture/142192

Sharma, D., Dhote, C., & Potey, M. (2016). Identity and Access Management as Security-as-a-Service from Clouds. Procedia Computer Science, 79, 170-174. doi: 10.1016/j.procs.2016.03.117

Waters, M. (2016). Evaluating Identity and Access Management (IAM) as a Cloud Service. Retrieved from http://www.researchgate.net/publication/311450332

 

Samar Work:

Servers are accessed on the internet by cloud technology. The databases and software run through the cloud making cloud computing possible. Data centers throughout the world host the cloud servers and thus the businesses have an opportunity to manage their business without necessarily moving from their location. The federation of the cloud computing system is defined as the unionization of servers, software, and businesses from distinct platforms and networks. The businesses clients can access the resources from the internet. “The future generation of the cloud is the federated cloud” (Shenai, S., & Aramudhan 2017). This means that cloud systems are going to be unionized since it’s the trending form of business strategy. Accessing business websites is easier when systems and databases are unionized

In a community setting, organizations sharing common interests such as goals, objectives, and vision ought to embrace the federation of architecture in their cloud systems (Lee, Bohn, Michel, M., Delaitre, Stivalet, Black & Grantham 2020). This enables the business organization to function as if they were one. Companies can sell their products online to clients who access the server from different locations. The customer service is enhanced when cloud computing systems are federalized. Many businesses are embracing the federation of cloud computing systems since they can compete well in the market.

Federation is defined as enabling interaction or collaboration between organizations. Cloud federation is achieved by harmonizing the system and objectives such that goals and objectives do not conflict with each other. Cloud federation targets two major points; cloud providers and end-users. The cloud providers try their best to harmonize the systems and come up with the best-federated architecture. Customer needs are treated as a priority and they direct the cloud providers on how to deal with the needs.

Cloud architecture is enabled by three building blocks which include; the component in the frontend, a resource-based broker, and an interface on clouds. The front end component of architecture involves the user navigation in the platform. The user can easily access available services, selection of the service, and billing on the service selected. The component includes web front end which enhances user interface, Front end which is API-based which enhances machine operations and management operations that involves control of user credentials.

The broker of resources module involves the cloud service providers. The component is comprised of three modules; match-making, billing, and metering components. These components ensure that customers are served efficiently and confidential information is protected from attackers and cyberbullies.  The transparency is also enhanced between the customers and cloud computing service providers. The resource interface component ensures that the billing information is availed and this enables customers to transact effectively and this makes cloud computing a reliable service. ’Cloud computing industry is rapidly transforming the information technology landscape’’ (Odun-Ayo, Ananya, Agono & Goddy-Worlu 2018)

References

Shenai, S., & Aramudhan, M. (2017, May). A federated cloud computing model with self-organizing capability using trust negotiation. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1-6). IEEE.

Lee, C. A., Bohn, R. B., Michel, M., Delaitre, A., Stivalet, B., Black, P. E. & Grantham, J. (2020). The NIST Cloud Federation Reference Architecture 5. NIST Special Publication500, 332.

Odun-Ayo, I., Ananya, M., Agono, F., & Goddy-Worlu, R. (2018, July). Cloud computing architecture: A critical analysis. In 2018 18th International Conference on Computational Science and Applications (ICCSA) (pp. 1-7). IEEE.

The post Identity and Access Management (IAM) appeared first on Infinite Essays.

[ad_2]

Source link

Looking for this or a Similar Assignment? Click below to Place your Order