A Model Apporach for Identity and Access Management (IAM) System in the Cloud
Anil Kumar1, Abhay Bhatia2, Anju Mishra3, Tanu Gupta4
1Dr. Anil Kumar, Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.
2Dr. Abhay Bhatia, Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.
3Dr. Anju Mishra, Department of Information Technology, AKGEC, Ghaziabad (U.P.), India.
4Tanu Gupta, Department of Information Technology, AKGEC, Ghaziabad (U.P.), India.
Manuscript received on 02 January 2024 | Revised Manuscript received on 10 January 2024 | Manuscript Accepted on 15 January 2024 | Manuscript published on 30 January 2024 | PP: 28-36 | Volume-13 Issue-6, January 2024 | Retrieval Number: 100.1/ijsce.D364514040924 | DOI: 10.35940/ijsce.D3645.13060124
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Through the use of cloud computing, information may be accessible from a range of different types of devices. It is now possible to communicate with a company at any time and from any location, regardless of time zone. Utilising the cloud offers several advantages, including lower expenditures on information technology and infrastructure, increased agility, and improved continuity planning. These benefits can only be attained via the implementation of a reliable identity and access control system for cloud applications and services. Managing these identities and limiting the access that cloud clients and applications have remains a significant challenge in the modern era. To strengthen the protection offered by a venture, it is necessary to establish a trustworthy identity and access management (IAM) system in the cloud. The findings of this study provide an intelligent and reliable IAM system that is based on cloud computing.
Keywords: IAM, Cloud Computing, Access Control System, Reliable Identity, SAML, SPML, XACML
Scope of the Article: Cloud Computing and Networking