Cloud computing security management

Sameera Abdulrahman Almulla, Chan Yeob Yeun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

92 Scopus citations

Abstract

Enterprises are seeking toward the cloud horizon to expand their premises facilities. It provides several services in the market, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper will discuss challenges regarding three information security concerns: confidentiality, integrity and availability. Most of the organizations are very much concerned about the ownership of their data. This paper will not only address security challenges for cloud computing including Identity and Access Management (IAM) but also present the current state authentication, authorization and auditing of users accessing the cloud along with emerging IAM protocols and standards.

Original languageBritish English
Title of host publication2010 2nd International Conference on Engineering System Management and Applications, ICESMA 2010
StatePublished - 2010
Event2010 2nd International Conference on Engineering System Management and Applications, ICESMA 2010 - Sharjah, United Arab Emirates
Duration: 30 Mar 20101 Apr 2010

Publication series

Name2010 2nd International Conference on Engineering System Management and Applications, ICESMA 2010

Conference

Conference2010 2nd International Conference on Engineering System Management and Applications, ICESMA 2010
Country/TerritoryUnited Arab Emirates
CitySharjah
Period30/03/101/04/10

Keywords

  • Cloud computing
  • Identity and access management
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Cloud computing security management'. Together they form a unique fingerprint.

Cite this