SlideShare a Scribd company logo
1 of 8
Download to read offline
Tutors India Lab
1 | Engineering and Technology
TIPS FOR DEVELOPING SECURE
AND FLEXIBLE MANAGEMENT
POLICY FOR MULTIPLE USERS
OVER THE CLOUD
Tutors India Lab
Tutors India Lab
1 | Engineering and Technology
EXECUTIVE
SUMMARY
	 Developing Secure and Flexible Management Policy
for both multiple Users and cloud system.
	
Identity and access management process is capable of
per forming functions like information exchange,
administration, maintenance, management and data
authentication.
	
To enhance the performance of flexible management
using effective key-based authentication approach.
2
1
2
3
Tutors India Lab
1 | Engineering and Technology
INTRODUCTION
The ascent of Cloud Computing (CC), a huge
number of clients and different applications have
looked to speak with one another, swapping sen-
sitive information (Werner, Westphall, & Westphall,
2017). In consequences, for efficiently managing
various resources and applications, the use of
tools and models is significant for securely man-
aging different user identities as well as avoiding
compromising data privacy. For this, most of them
suggested a federated identity management pro-
cess which utilizes the privacy appliances towards
assisting in consistence with current legislation. In
the section, we analyse the privacy and security
issues in cloud identity management and relating
the features and challenges. At the end we dis-
cuss brief note of recommendation for Developing
Secure and Flexible Management Policy for both
multiple Users and cloud system.
3
Tutors India Lab
1 | Engineering and Technology
SIGNIFICANCE AND NEED OF
IDENTITY MANAGEMENT AND
FINE-GRAINED ACCESS CONTROL POLICIES
Generally, the CC improves the managing capability
of computing sources through merging the con-
cepts like on-demand use, elasticity and resource
allocation in a dynamic manner (Eludiora et al.,
2011). However, for multiple users, cloud system
and huge amount of data in the field of big data
application becomes complex (Subashini & Kavitha,
2011) wherein the concern of privacy issues. In this
perspective, Identity and Access Management (IAM)
is frequently used towards providing access control
facilities and control identity of data. Few of the
identity management (IM) tools utilizes with appro-
priate individualities (S. Singh, Jeong, & Park, 2016)
by considering various mechanism for addressing
privacy issues. But, till there is an issue like user data
leakage, lack of control on the dissemination of per
sonal information are recurring and distribution of
unnecessary attributes in cloud environments (Cas
tiglione et al., 2015; A. Singh & Chatterjee, 2015). So,
to obtain cloud identity management as well as met
the present regulation, the providers should protect
the user privacy, data, entities and data throughout
their lifecycle. (Indu, Anand, & Bhaskar, 2018; Wer-
ner et al., 2017). This identity management proce-
dure will meet the requirement fine-grained access
control process and user flexibility of data access.
IM components dealt with the need for authoriza-
tion and authentication Legillon et al. (2013) in the
cloud environment (Oliveira, Trinta, Vieira, & Cortes,
2018). The pictorial representation of Cloud Storage
System with respect to the system Characteristics,
Need and Challenges are discussed below
Overview of Cloud Storage System Based on Characteristics, Need and Challenges
4
Tutors India Lab
1 | Engineering and Technology
BRIEF NOTES ON
AUTHENTICATION, AUTHORIZATION,
IDENTITY AND ACCESS MANAGEMENT
Authentication (AN)
The term AN is defined as the process of approving an entity via other entity which is used to ensure whether
the application or person is qualified for claiming or accessing data. The common AN approaches are third
party authentication, 3D password objects, digital device authentication, multifactor authentication, simple text
passwords, biometric authentication and graphical passwords. Nowadays, cloud access consent is granted via
the IM system (Butun, Erol-Kantarci, Kantarci, & Song, 2016; Indu et al., 2018).
Authorization (AR)
Based on the authenticated user’s entitlements, the AR will be disagreeing or permitting access to a particu-
lar resource. AR decides like what applications or which user is permitted to make on system and application/
user identity data are used for decision making Khan et al., 2014). The cloud network comprises various service
providers in which a single user can access various services at same time whereas each service from various
security levels and service provider “Indu et al., 2018’.For ensuring the valid user’s access (for various services
and resources) in IAM system, an access control governance cloud service provider (CSPs) defines the set of
policies which is relevant to the access control. To meet the objective of each organization, CSPs should ensure
the significant features such as Governance, Risk Management and Compliance (GRC) (Indu et al., 2018; Zhang,
Zheng, Li, Li, & Li, 2016).
5
Tutors India Lab
1 | Engineering and Technology
Identity & access management
systems (IAM)
First, the term IM is a process of managing, creating
using identities and infrastructure which offered
support for these processes. Also, it is capable of
performing functions like discovery, policy en-
forcement, information exchange, administration,
maintenance, management and data authentication.
Each application or person identified through cre-
dential that denotes a group of attributes, delivered
through reliable resources (Werner et al., 2017).
To ensure the security in IAM, the data’s are ap-
proved and managed by the same identity for entire
applications. It is used to validate the data users,
services or devices as well as have rights to access
or deny data. Moreover, it does not need its own
authentication or identity to authenticate the data
(Indu et al., 2018). The IAM simplifies the manage-
ment of large-scale distributed systems which mini-
mizes the application workload.
6
Identity & access management systems (IAM)
Tutors India Lab
1 | Engineering and Technology
FUTURE SCOPE
From the above points, we concluded that there is a need for effective
key-based authentication to enhance the performance of flexible management
for both multiple users and cloud system.
Also required authorization policies for multi-party cloud infrastructure
data sharing as it offers flexible and dynamic operations.
SUMMARY
This section summarized and analysed the recent security,
mitigations and potential threats aspects in cloud system along
with the significance of data access management, identity
management, services and security concern. From this we found
there is a need for effective IAM mechanism for development of
secure and flexible management policies which will enhance the
system performance in both security and privacy concern.
7
Tutors India Lab
1 | Engineering and Technology
REFERENCES
Butun, I., Erol-Kantarci, M., Kantarci, B., & Song, H. (2016).
Cloud-centric multi-level authentication as a service for
secure public safety device networks. IEEE Communi-
cations Magazine, 54(4), 47–53. https://doi.org/10.1109/
MCOM.2016.7452265
Castiglione, A., De Santis, A., Masucci, B., Palmieri, F.,
Castiglione, A., Li, J., & Huang, X. (2015). Hierarchical and
Shared Access Control. IEEE Transactions on Information
Forensics and Security, 11(4), 850–865. https://doi.org/10.1109/
TIFS.2015.2512533
Eludiora, S., Abiona, O., Oluwatope, A., Oluwaranti, A., Onime,
C., & Kehinde, L. (2011). A User Identity Management Protocol
for Cloud Computing Paradigm. International Journal of Com-
munications, Network and System Sciences, 04(03), 152–163.
https://doi.org/10.4236/ijcns.2011.43019
Indu, Anand, R., & Bhaskar, V. (2018). Identity and access man-
agement in cloud environment: Mechanisms and challenges.
Engineering Science and Technology, an International Journal,
21(4), 574–588. https://doi.org/10.1016/j.jestch.2018.05.010
Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. ur R.,
& Shamshirband, S. (2014). Incremental proxy re-encryption
scheme for mobile cloud computing environment. The Journal
of Supercomputing, 68(2), 624–651. https://doi.org/10.1007/
s11227-013-1055-z
Legillon, F., Melab, N., Renard, D., & Talbi, E.-G. (2013). Cost
minimization of service deployment in a multi-cloud environ-
ment. In 2013 IEEE Congress on Evolutionary Computation (pp.
2580–2587). IEEE. https://doi.org/10.1109/CEC.2013.6557880
Oliveira, de C. J., Trinta, F., Vieira, D., & Cortes, O. A. C. (2018).
Evolutionary solutions for resources management in multiple
clouds: State-of-the-art and future directions. Future Genera-
tion Computer Systems, 88, 284–296. https://doi.org/10.1016/j.
future.2018.05.087
Singh, A., & Chatterjee, K. (2015). Identity Management in
Cloud Computing through Claim-Based Solution. In 2015
Fifth International Conference on Advanced Computing &
Communication Technologies (pp. 524–529). IEEE. https://doi.
org/10.1109/ACCT.2015.89
Singh, S., Jeong, Y.-S., & Park, J. H. (2016). A survey on cloud
computing security: Issues, threats, and solutions. Journal of
Network and Computer Applications, 75, 200–222. https://doi.
org/10.1016/j.jnca.2016.09.002
Subashini, S., & Kavitha, V. (2011). A survey on security issues
in service delivery models of cloud computing. Journal of
Network and Computer Applications, 34(1), 1–11. https://doi.
org/10.1016/j.jnca.2010.07.006
Werner, J., Westphall, C. M., & Westphall, C. B. (2017). Cloud
identity management: A survey on privacy strategies.
Computer Networks, 122, 29–42. https://doi.org/10.1016/j.
comnet.2017.04.030
Zhang, Y., Zheng, D., Li, Q., Li, J., & Li, H. (2016). Online/offline
unbounded multi-authority attribute-based encryption for data
sharing in mobile cloud computing. Security and Communi-
cation Networks, 9(16), 3688–3702. https://doi.org/10.1002/
sec.1574
Format Type : E-Book
Copyright © 2001 - 2019 Tutors India All Rights Reserved.
No part of this document should be modified/used without prior consent.
Cell:+91-4448137070
Web:www.tutorsindia.com
Email:info@tutorsindia.com
ABOUT THE DEPARTMENT
Engineering and Technology Lab at Tutors India is involved
in exploring novel research areas for the challenges faced
by today’s technology-oriented business or organisation, the
market, the economy, finance and sales. The research team
explores and identifies troubling questions that exist in schol-
arly literature, in theory, or in practices that needs deliberate
investigation.
ABOUT US
Tutors India, is world’s reputed academic guidance provider for have guided
more than 4,500 Ph.D. scholars and 10,500 Masters Students across the
globe. We support students, research scholars, entrepreneurs, and profes-
sionals from various organizations in providing consistently high-quality
writing and data analytical services every time. We value every client and
make sure their requirements are identified and understood by our special-
ized professionals and analysts, enriched in experience to deliver technically
sound output within the requested timeframe. Writers at Tutors India are best
referred as ‘Researchers’ since every topic they handle unique and challeng-
ing. We specialize in handling text and data, i.e., content development and
Statistical analysis where the latest statistical applications are exhausted
by our expert analysts for determining the outcome of the data analysed.
Qualified and experienced researchers including Ph.D. holders, statisticians,
and research analysts offer cutting edge research consulting and writing
services to meet your business information or academic project requirement.
Our expertise has passion towards research and personal assistance as we
work closely with you for a very professional and quality output within your
stipulated time frame. Our services cover vast areas, and we also support
either part or entire research paper/service as per your requirement at
competitive prices.
*
*
*
*
*
*
*
*
*
*
*
*

More Related Content

What's hot

Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...IJERA Editor
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management Systemijtsrd
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Security issues in cloud computing for msmes
Security issues in cloud computing for msmesSecurity issues in cloud computing for msmes
Security issues in cloud computing for msmesIAEME Publication
 
Security issues in cloud computing for msmes
Security issues in cloud computing for msmesSecurity issues in cloud computing for msmes
Security issues in cloud computing for msmesIAEME Publication
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 

What's hot (18)

Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...Implementing Iris in the Railway Control Office Application for Secure Saas i...
Implementing Iris in the Railway Control Office Application for Secure Saas i...
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
I42024349
I42024349I42024349
I42024349
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Security issues in cloud computing for msmes
Security issues in cloud computing for msmesSecurity issues in cloud computing for msmes
Security issues in cloud computing for msmes
 
Security issues in cloud computing for msmes
Security issues in cloud computing for msmesSecurity issues in cloud computing for msmes
Security issues in cloud computing for msmes
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 

Similar to DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD

A Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecurityA Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecuritySandra Long
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid Doret
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARETRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCAREMervat Bamiah
 
211880_Litterature Review.pptx
211880_Litterature Review.pptx211880_Litterature Review.pptx
211880_Litterature Review.pptxMuhammadMazhar83
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
Attribute‑based data fusion for designing a rational trust model for improvin...
Attribute‑based data fusion for designing a rational trust model for improvin...Attribute‑based data fusion for designing a rational trust model for improvin...
Attribute‑based data fusion for designing a rational trust model for improvin...Venu Madhav
 
5 Springer Bhasker July 21.pdf
5 Springer Bhasker July 21.pdf5 Springer Bhasker July 21.pdf
5 Springer Bhasker July 21.pdfVenu Madhav
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieVannaSchrader3
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 

Similar to DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD (20)

A Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecurityA Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud Security
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM FoundationsDavid doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
David doret (2019) SIGS IAM Conference: Revisiting IAM Foundations
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARETRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
 
211880_Litterature Review.pptx
211880_Litterature Review.pptx211880_Litterature Review.pptx
211880_Litterature Review.pptx
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Attribute‑based data fusion for designing a rational trust model for improvin...
Attribute‑based data fusion for designing a rational trust model for improvin...Attribute‑based data fusion for designing a rational trust model for improvin...
Attribute‑based data fusion for designing a rational trust model for improvin...
 
5 Springer Bhasker July 21.pdf
5 Springer Bhasker July 21.pdf5 Springer Bhasker July 21.pdf
5 Springer Bhasker July 21.pdf
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 

More from Tutors India

Ontology learning techniques and applications computer science thesis writing...
Ontology learning techniques and applications computer science thesis writing...Ontology learning techniques and applications computer science thesis writing...
Ontology learning techniques and applications computer science thesis writing...Tutors India
 
A genre based analysis on the discussion section of ph d research manuscript ...
A genre based analysis on the discussion section of ph d research manuscript ...A genre based analysis on the discussion section of ph d research manuscript ...
A genre based analysis on the discussion section of ph d research manuscript ...Tutors India
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tutors India
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tutors India
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tutors India
 
Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Tutors India
 
Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Tutors India
 
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...Tutors India
 
Difficulties researchers face while choosing a dissertation topic in business...
Difficulties researchers face while choosing a dissertation topic in business...Difficulties researchers face while choosing a dissertation topic in business...
Difficulties researchers face while choosing a dissertation topic in business...Tutors India
 
important characteristics for presenting an outstanding dissertation in compu...
important characteristics for presenting an outstanding dissertation in compu...important characteristics for presenting an outstanding dissertation in compu...
important characteristics for presenting an outstanding dissertation in compu...Tutors India
 
Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...Tutors India
 
The research study must then be “unpacked” carefully, systematically and scie...
The research study must then be “unpacked” carefully, systematically and scie...The research study must then be “unpacked” carefully, systematically and scie...
The research study must then be “unpacked” carefully, systematically and scie...Tutors India
 
What is the critical analysis assignment a guide to help students to write an...
What is the critical analysis assignment a guide to help students to write an...What is the critical analysis assignment a guide to help students to write an...
What is the critical analysis assignment a guide to help students to write an...Tutors India
 
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors India
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors IndiaLack of Awareness on Students Lead to Poor Research Proposal- Tutors India
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors IndiaTutors India
 
How to Write a Master’s Dissertation for Management - Tutors India
How to Write a Master’s Dissertation for Management - Tutors IndiaHow to Write a Master’s Dissertation for Management - Tutors India
How to Write a Master’s Dissertation for Management - Tutors IndiaTutors India
 
How to develop the research idea into a research proposal focus on nursing re...
How to develop the research idea into a research proposal focus on nursing re...How to develop the research idea into a research proposal focus on nursing re...
How to develop the research idea into a research proposal focus on nursing re...Tutors India
 
Importance of writing literature review in postgraduate dissertation tutors ...
Importance of writing literature review in postgraduate dissertation  tutors ...Importance of writing literature review in postgraduate dissertation  tutors ...
Importance of writing literature review in postgraduate dissertation tutors ...Tutors India
 
Trends and issues of artificial intelligence in medical application tutors i...
Trends and issues of artificial intelligence in medical application  tutors i...Trends and issues of artificial intelligence in medical application  tutors i...
Trends and issues of artificial intelligence in medical application tutors i...Tutors India
 
Layout of engineering report tutorsindia.com
Layout of engineering report  tutorsindia.comLayout of engineering report  tutorsindia.com
Layout of engineering report tutorsindia.comTutors India
 
Importance of research metrics in scientific research
Importance of research metrics in scientific researchImportance of research metrics in scientific research
Importance of research metrics in scientific researchTutors India
 

More from Tutors India (20)

Ontology learning techniques and applications computer science thesis writing...
Ontology learning techniques and applications computer science thesis writing...Ontology learning techniques and applications computer science thesis writing...
Ontology learning techniques and applications computer science thesis writing...
 
A genre based analysis on the discussion section of ph d research manuscript ...
A genre based analysis on the discussion section of ph d research manuscript ...A genre based analysis on the discussion section of ph d research manuscript ...
A genre based analysis on the discussion section of ph d research manuscript ...
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)
 
Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)Tools and techniques in social research uk uae australia europe (1)
Tools and techniques in social research uk uae australia europe (1)
 
Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)
 
Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)Enrapture your audience with well designed poster presentation (1)
Enrapture your audience with well designed poster presentation (1)
 
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...
What are the Challenges in choosing a PhD MBA dissertation topics help in Bus...
 
Difficulties researchers face while choosing a dissertation topic in business...
Difficulties researchers face while choosing a dissertation topic in business...Difficulties researchers face while choosing a dissertation topic in business...
Difficulties researchers face while choosing a dissertation topic in business...
 
important characteristics for presenting an outstanding dissertation in compu...
important characteristics for presenting an outstanding dissertation in compu...important characteristics for presenting an outstanding dissertation in compu...
important characteristics for presenting an outstanding dissertation in compu...
 
Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...
 
The research study must then be “unpacked” carefully, systematically and scie...
The research study must then be “unpacked” carefully, systematically and scie...The research study must then be “unpacked” carefully, systematically and scie...
The research study must then be “unpacked” carefully, systematically and scie...
 
What is the critical analysis assignment a guide to help students to write an...
What is the critical analysis assignment a guide to help students to write an...What is the critical analysis assignment a guide to help students to write an...
What is the critical analysis assignment a guide to help students to write an...
 
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors India
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors IndiaLack of Awareness on Students Lead to Poor Research Proposal- Tutors India
Lack of Awareness on Students Lead to Poor Research Proposal- Tutors India
 
How to Write a Master’s Dissertation for Management - Tutors India
How to Write a Master’s Dissertation for Management - Tutors IndiaHow to Write a Master’s Dissertation for Management - Tutors India
How to Write a Master’s Dissertation for Management - Tutors India
 
How to develop the research idea into a research proposal focus on nursing re...
How to develop the research idea into a research proposal focus on nursing re...How to develop the research idea into a research proposal focus on nursing re...
How to develop the research idea into a research proposal focus on nursing re...
 
Importance of writing literature review in postgraduate dissertation tutors ...
Importance of writing literature review in postgraduate dissertation  tutors ...Importance of writing literature review in postgraduate dissertation  tutors ...
Importance of writing literature review in postgraduate dissertation tutors ...
 
Trends and issues of artificial intelligence in medical application tutors i...
Trends and issues of artificial intelligence in medical application  tutors i...Trends and issues of artificial intelligence in medical application  tutors i...
Trends and issues of artificial intelligence in medical application tutors i...
 
Layout of engineering report tutorsindia.com
Layout of engineering report  tutorsindia.comLayout of engineering report  tutorsindia.com
Layout of engineering report tutorsindia.com
 
Importance of research metrics in scientific research
Importance of research metrics in scientific researchImportance of research metrics in scientific research
Importance of research metrics in scientific research
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD

  • 1. Tutors India Lab 1 | Engineering and Technology TIPS FOR DEVELOPING SECURE AND FLEXIBLE MANAGEMENT POLICY FOR MULTIPLE USERS OVER THE CLOUD Tutors India Lab
  • 2. Tutors India Lab 1 | Engineering and Technology EXECUTIVE SUMMARY Developing Secure and Flexible Management Policy for both multiple Users and cloud system. Identity and access management process is capable of per forming functions like information exchange, administration, maintenance, management and data authentication. To enhance the performance of flexible management using effective key-based authentication approach. 2 1 2 3
  • 3. Tutors India Lab 1 | Engineering and Technology INTRODUCTION The ascent of Cloud Computing (CC), a huge number of clients and different applications have looked to speak with one another, swapping sen- sitive information (Werner, Westphall, & Westphall, 2017). In consequences, for efficiently managing various resources and applications, the use of tools and models is significant for securely man- aging different user identities as well as avoiding compromising data privacy. For this, most of them suggested a federated identity management pro- cess which utilizes the privacy appliances towards assisting in consistence with current legislation. In the section, we analyse the privacy and security issues in cloud identity management and relating the features and challenges. At the end we dis- cuss brief note of recommendation for Developing Secure and Flexible Management Policy for both multiple Users and cloud system. 3
  • 4. Tutors India Lab 1 | Engineering and Technology SIGNIFICANCE AND NEED OF IDENTITY MANAGEMENT AND FINE-GRAINED ACCESS CONTROL POLICIES Generally, the CC improves the managing capability of computing sources through merging the con- cepts like on-demand use, elasticity and resource allocation in a dynamic manner (Eludiora et al., 2011). However, for multiple users, cloud system and huge amount of data in the field of big data application becomes complex (Subashini & Kavitha, 2011) wherein the concern of privacy issues. In this perspective, Identity and Access Management (IAM) is frequently used towards providing access control facilities and control identity of data. Few of the identity management (IM) tools utilizes with appro- priate individualities (S. Singh, Jeong, & Park, 2016) by considering various mechanism for addressing privacy issues. But, till there is an issue like user data leakage, lack of control on the dissemination of per sonal information are recurring and distribution of unnecessary attributes in cloud environments (Cas tiglione et al., 2015; A. Singh & Chatterjee, 2015). So, to obtain cloud identity management as well as met the present regulation, the providers should protect the user privacy, data, entities and data throughout their lifecycle. (Indu, Anand, & Bhaskar, 2018; Wer- ner et al., 2017). This identity management proce- dure will meet the requirement fine-grained access control process and user flexibility of data access. IM components dealt with the need for authoriza- tion and authentication Legillon et al. (2013) in the cloud environment (Oliveira, Trinta, Vieira, & Cortes, 2018). The pictorial representation of Cloud Storage System with respect to the system Characteristics, Need and Challenges are discussed below Overview of Cloud Storage System Based on Characteristics, Need and Challenges 4
  • 5. Tutors India Lab 1 | Engineering and Technology BRIEF NOTES ON AUTHENTICATION, AUTHORIZATION, IDENTITY AND ACCESS MANAGEMENT Authentication (AN) The term AN is defined as the process of approving an entity via other entity which is used to ensure whether the application or person is qualified for claiming or accessing data. The common AN approaches are third party authentication, 3D password objects, digital device authentication, multifactor authentication, simple text passwords, biometric authentication and graphical passwords. Nowadays, cloud access consent is granted via the IM system (Butun, Erol-Kantarci, Kantarci, & Song, 2016; Indu et al., 2018). Authorization (AR) Based on the authenticated user’s entitlements, the AR will be disagreeing or permitting access to a particu- lar resource. AR decides like what applications or which user is permitted to make on system and application/ user identity data are used for decision making Khan et al., 2014). The cloud network comprises various service providers in which a single user can access various services at same time whereas each service from various security levels and service provider “Indu et al., 2018’.For ensuring the valid user’s access (for various services and resources) in IAM system, an access control governance cloud service provider (CSPs) defines the set of policies which is relevant to the access control. To meet the objective of each organization, CSPs should ensure the significant features such as Governance, Risk Management and Compliance (GRC) (Indu et al., 2018; Zhang, Zheng, Li, Li, & Li, 2016). 5
  • 6. Tutors India Lab 1 | Engineering and Technology Identity & access management systems (IAM) First, the term IM is a process of managing, creating using identities and infrastructure which offered support for these processes. Also, it is capable of performing functions like discovery, policy en- forcement, information exchange, administration, maintenance, management and data authentication. Each application or person identified through cre- dential that denotes a group of attributes, delivered through reliable resources (Werner et al., 2017). To ensure the security in IAM, the data’s are ap- proved and managed by the same identity for entire applications. It is used to validate the data users, services or devices as well as have rights to access or deny data. Moreover, it does not need its own authentication or identity to authenticate the data (Indu et al., 2018). The IAM simplifies the manage- ment of large-scale distributed systems which mini- mizes the application workload. 6 Identity & access management systems (IAM)
  • 7. Tutors India Lab 1 | Engineering and Technology FUTURE SCOPE From the above points, we concluded that there is a need for effective key-based authentication to enhance the performance of flexible management for both multiple users and cloud system. Also required authorization policies for multi-party cloud infrastructure data sharing as it offers flexible and dynamic operations. SUMMARY This section summarized and analysed the recent security, mitigations and potential threats aspects in cloud system along with the significance of data access management, identity management, services and security concern. From this we found there is a need for effective IAM mechanism for development of secure and flexible management policies which will enhance the system performance in both security and privacy concern. 7
  • 8. Tutors India Lab 1 | Engineering and Technology REFERENCES Butun, I., Erol-Kantarci, M., Kantarci, B., & Song, H. (2016). Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communi- cations Magazine, 54(4), 47–53. https://doi.org/10.1109/ MCOM.2016.7452265 Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., & Huang, X. (2015). Hierarchical and Shared Access Control. IEEE Transactions on Information Forensics and Security, 11(4), 850–865. https://doi.org/10.1109/ TIFS.2015.2512533 Eludiora, S., Abiona, O., Oluwatope, A., Oluwaranti, A., Onime, C., & Kehinde, L. (2011). A User Identity Management Protocol for Cloud Computing Paradigm. International Journal of Com- munications, Network and System Sciences, 04(03), 152–163. https://doi.org/10.4236/ijcns.2011.43019 Indu, Anand, R., & Bhaskar, V. (2018). Identity and access man- agement in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 21(4), 574–588. https://doi.org/10.1016/j.jestch.2018.05.010 Khan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. ur R., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624–651. https://doi.org/10.1007/ s11227-013-1055-z Legillon, F., Melab, N., Renard, D., & Talbi, E.-G. (2013). Cost minimization of service deployment in a multi-cloud environ- ment. In 2013 IEEE Congress on Evolutionary Computation (pp. 2580–2587). IEEE. https://doi.org/10.1109/CEC.2013.6557880 Oliveira, de C. J., Trinta, F., Vieira, D., & Cortes, O. A. C. (2018). Evolutionary solutions for resources management in multiple clouds: State-of-the-art and future directions. Future Genera- tion Computer Systems, 88, 284–296. https://doi.org/10.1016/j. future.2018.05.087 Singh, A., & Chatterjee, K. (2015). Identity Management in Cloud Computing through Claim-Based Solution. In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (pp. 524–529). IEEE. https://doi. org/10.1109/ACCT.2015.89 Singh, S., Jeong, Y.-S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200–222. https://doi. org/10.1016/j.jnca.2016.09.002 Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi. org/10.1016/j.jnca.2010.07.006 Werner, J., Westphall, C. M., & Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122, 29–42. https://doi.org/10.1016/j. comnet.2017.04.030 Zhang, Y., Zheng, D., Li, Q., Li, J., & Li, H. (2016). Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Security and Communi- cation Networks, 9(16), 3688–3702. https://doi.org/10.1002/ sec.1574 Format Type : E-Book Copyright © 2001 - 2019 Tutors India All Rights Reserved. No part of this document should be modified/used without prior consent. Cell:+91-4448137070 Web:www.tutorsindia.com Email:info@tutorsindia.com ABOUT THE DEPARTMENT Engineering and Technology Lab at Tutors India is involved in exploring novel research areas for the challenges faced by today’s technology-oriented business or organisation, the market, the economy, finance and sales. The research team explores and identifies troubling questions that exist in schol- arly literature, in theory, or in practices that needs deliberate investigation. ABOUT US Tutors India, is world’s reputed academic guidance provider for have guided more than 4,500 Ph.D. scholars and 10,500 Masters Students across the globe. We support students, research scholars, entrepreneurs, and profes- sionals from various organizations in providing consistently high-quality writing and data analytical services every time. We value every client and make sure their requirements are identified and understood by our special- ized professionals and analysts, enriched in experience to deliver technically sound output within the requested timeframe. Writers at Tutors India are best referred as ‘Researchers’ since every topic they handle unique and challeng- ing. We specialize in handling text and data, i.e., content development and Statistical analysis where the latest statistical applications are exhausted by our expert analysts for determining the outcome of the data analysed. Qualified and experienced researchers including Ph.D. holders, statisticians, and research analysts offer cutting edge research consulting and writing services to meet your business information or academic project requirement. Our expertise has passion towards research and personal assistance as we work closely with you for a very professional and quality output within your stipulated time frame. Our services cover vast areas, and we also support either part or entire research paper/service as per your requirement at competitive prices. * * * * * * * * * * * *