Title :
Management of identity and credentials in mobile cloud environment
Author :
Jana, D. ; Bandyopadhyay, Debasis
Author_Institution :
BIT, TEOCO Software Pvt Ltd., Kolkata, India
Abstract :
One of the significant objective of most enterprise information security measures is to ensure providing robust identity and access management (IAM) to its users. This encompasses systems straddling across the globe allowing the access of sensitive as well as confidential data of the enterprise at any point in time. With rapid mounting proliferation of mobile devices but with limited resources, cloud computing has emerged as an obvious predilection for performing resource intensive tasks over the cloud. To address the security issues, cloud service providers (CSPs) are coming up with new services such as Security as a Service (SecaaS). From our analysis of security threats and its measures, we feel that additional controls are required for Identity and Access Management for mobile cloud users. We have made some security recommendations along with best practices for consumers and service providers to consider ensuring robust information security including IAM for growing mobile users in cloud.
Keywords :
authorisation; cloud computing; mobile computing; CSP; IAM; SecaaS; access management; cloud computing; cloud mobile users; cloud service providers; confidential data access; credential management; enterprise information security measure; identity management; mobile cloud environment; mobile cloud users; mobile devices; resource intensive task; robust information security; security as a service; security recommendation; security threat analysis; sensitive data access; Authentication; Authorization; Cloud computing; Mobile communication; Mobile computing; Mobile handsets;
Conference_Titel :
Advanced Computer Science and Information Systems (ICACSIS), 2013 International Conference on
Conference_Location :
Bali
DOI :
10.1109/ICACSIS.2013.6761561