Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study

The aspect of virtualization and large scale distribution has brought forward the cloud computing phenomenon. Despite its popularity, most of the enterprises are still circumspect in getting into clouds completely. The major part of this circumspection owes to the factors of identity and access management, monitoring, auditing and reporting. The traditional access management will not suffice in the cloud context naturally. Also, every enterprise needs to monitor its employees as well as usage of services which will also assist in auditing. It will be better to have centralized monitoring clubbed with a centralized access management at the enterprise which coordinates with access management and monitoring as a service at the provider.

[1]  Jose M. Alcaraz Calero,et al.  Toward a Multi-Tenancy Authorization System for Cloud Services , 2010, IEEE Security & Privacy.

[2]  William J. Caelli,et al.  Mutual Protection in a Cloud Computing Environment , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[3]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[4]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[5]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[7]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.

[8]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[9]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[10]  Jonathan M. Spring,et al.  Monitoring Cloud Computing by Layer, Part 2 , 2011, IEEE Security & Privacy.

[11]  Ulrich Lang,et al.  OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  S. Thamarai Selvi,et al.  Trust management system for grid and cloud resources , 2009, 2009 First International Conference on Advanced Computing.

[13]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[14]  Ian Sommerville,et al.  Research Challenges for Enterprise Cloud Computing , 2010, ArXiv.

[15]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[16]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.