Abstract:
It is widely recognized that cloud-based services have experienced a significant increase in popularity, accompanied by notable success. However, the security risks persi...Show MoreMetadata
Abstract:
It is widely recognized that cloud-based services have experienced a significant increase in popularity, accompanied by notable success. However, the security risks persist as a consequence of this progress. Cloud Service Providers (CSPs) need to challenge those security risks to make users trust their services cloud. Identity management is a key concern within the cloud environment, where several efforts have been and will continue to be made in order to ensure that no one other than the right user gets access to these services. Various identity management protocols and mechanisms have been implemented by Cloud Service Providers (CSPs). This paper provides a comprehensive overview of these commonly used protocols, including Credentials, Multi-Factor Authentication (MFA), and Single Sign-On (SSO). The main focus is placed on analyzing their features, potential security vulnerabilities, and proposed mitigations.
Date of Conference: 21-23 November 2023
Date Added to IEEE Xplore: 29 December 2023
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Identity Management ,
- Cloud Computing ,
- Two-factor ,
- Security Risks ,
- Security Vulnerabilities ,
- Cloud Environment ,
- Cloud-based Services ,
- Metadata ,
- Encryption ,
- Physical Mechanisms ,
- Security Issues ,
- Ideal System ,
- Information Leakage ,
- Web Browser ,
- Secret Key ,
- Public Key ,
- Markup Language ,
- Smart Card ,
- External Entities ,
- Authentication Mechanism ,
- DoS Attacks ,
- Malware
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Identity Management ,
- Cloud Computing ,
- Two-factor ,
- Security Risks ,
- Security Vulnerabilities ,
- Cloud Environment ,
- Cloud-based Services ,
- Metadata ,
- Encryption ,
- Physical Mechanisms ,
- Security Issues ,
- Ideal System ,
- Information Leakage ,
- Web Browser ,
- Secret Key ,
- Public Key ,
- Markup Language ,
- Smart Card ,
- External Entities ,
- Authentication Mechanism ,
- DoS Attacks ,
- Malware
- Author Keywords