A Survey On Identity and Access Manageme PDF
A Survey On Identity and Access Manageme PDF
ISSN: 2278-0181
Vol. 3 Issue 4, April - 2014
Abstract- Cloud computing is one of the most emerging computing vendors on agreed basis for specific duration and
technology in today’s scenario which aims to provide on- price[2]. Cloud computing has several deployment models,
demand scalable access to computing resources over the namely, Private cloud: in which the cloud infrastructure is
internet via cloud vendors to multi-tenant organizations. Cloud operated solely for a specific organization, and is managed
computing provides a way through which an organization can
by that organization only, Public Cloud: Here the resources
increase their computing capabilities and infrastructure
facilities dynamically as and when required. While cost and are shared by all users in a common space and it is owned
On-demand availability are the top two benefits of cloud, but by cloud provider, Hybrid cloud: It combines the features of
various trust and security issues are becoming the top concerns both private as well as public cloud and allow an
for the cloud computing users. In federated identity organization to run some application on private whereas
management environment, federated identity as a useful some on public clouds [3, 4]. There are basically five
feature for Single Sign-on (SSO) and user management has security issues in Cloud Computing Security Risks in Cloud
become an important part. Some of the problems in federated Computing that should be considered and included in the
identity management environment are platform typical Service Level Agreement (SLA) content. These are:
trustworthiness, management of multiple digital identities,
privileged user access, data location, data disposal and e-
identity theft. Security assertion markup language (SAML),
OAuth, OpenID is the main concepts in cloud authentication investigations and protective monitoring, data segregation
[8].
RT
and federated environment. This paper addresses the issue of
Identity and Access Management (IAM) under the cloud An identity is a set of unique characteristics of a user: an
computing security head. individual, a subject, or an object. An identity used for
identification purposes is called an identifier [5]. An Identity
IJE
Keywords- Cloud Computing, SSO, OpenID, Oauth, Identity Management System (IDM) supports the management of
federation, IAM, provisioning, Identity federation standards. multiple digital identities, their authentication, authorization,
roles, and privileges within or across system. It also decides
I. INTRODUCTION
how to disclose personally identifiable information (PII) and
Cloud Computing is a technology which aims to provide on- service specific user credentials of any user.IDM has
demand scalable services over the Internet via Cloud various components such as: Directory services, Access
vendors to multi-tenant organizations. Cloud Computing is management, Password administration including single
defined by the National Institute of Standards and sign-on, Identity authentication, User provisioning, Roles
Technology (NIST) as “a model for enabling convenient, management and Federated identities, which enables the
on-demand network access to a shared pool of configurable creation of virtual communities of customers and partners
computing resources (e.g. networks, servers, storage, that can conduct business on different websites with a single
applications and services) that can be rapidly provisioned log-in [6, 7].
and released with minimal management effort or service
provider interaction” [1]. The Cloud concept is defined by
five main characteristics: on-demand self-service, broad
network access, resource pooling, rapid elasticity and
measured service [25]. With the ever increasing
technological advancement, cloud computing has emerged
through different services such as, software as-a-service
(SAAS), Platform as-a service (PAAS), Infrastructure as-a
service (IAAS).Firstly, Software as-a Service: is a software
delivery model in which software and associated data are
centrally hosted on the cloud and is typically accessed by
the users using a thin client via a web browser. Secondly,
under Platform as-a Service: a computing platform such as
operating system is provided to the end user on the monthly
rental basis and thirdly, Infrastructure as-a Service: they are Figure 1: Cloud Computing
availed by the end users which are provided by the cloud
services on a large scale, which comes up with security security is gaining more attention among the researchers and
concerns of user data. Therefore, monitoring, storing, it has attracted huge capital investment in industries such as
managing and controlling user identities is very crucial Tivoli in IBM[28].Based on the related research an Identity
IJE
security concerns and requires a trust based solution[29]. In Management Framework helps in the alignment of Identity
an effort to understand the failures (and limited successes) Management initiatives with the organization’s business
of preceding identity management systems, Kim Cameron goals and security strategy. IDM also deals with issues
proposed seven laws of identity that he claims are essential related to privacy, Integrity, Confidentiality of data,
for successful identity management systems[9]. They are: Provisioning/De-provisioning, user authentication and
authorization. The IDM framework comprises of following
components:
1. User Control and Consent: An IDM system must obtain a
user’s permission to discover information that identifies the A. SSO
user.
2. Minimal Disclosure for a Constrained Use: An IDM Web Single-Sign On is one of the advantages provided by
system that exposes less identifying information and the SAML standard, because a user authenticated to one
inforces more limits on its use is preferred. web site (Identity provider), can access directly another web
3. Justifiable Parties: An IDM system must be designed so site (Service Provider), as is related in Fig: 3. The
that identifying information is revealed only to parties authentication details of the user will be recognized by the
having a essential and justifiable need. service provider, who took them from the identity provider,
4. Directed Identity: An IDM system must sustain global with the specification that between the identity provider and
identifiers for use by public entities and local identifiers for the service provider exist a trust relationship. The user’s
use by private entities. information between the two web sites is transferred by the
5. Pluralism of Operators and Technologies: An IDM SAML standard [11].Establishment of trust relationship
system must sustain interoperability of multiple identity between two web sites (called partners) and the process of
technologies executed by different identity providers. sharing users personal identifiable information (PII)
6. Human Integration: An IDM system must employ between them creates a federated identity for that user.
unambiguous human-machine interaction mechanisms that
forbid identity-based attacks (example: phishing and
impersonation).
7. Consistent Experience across Contexts: An IDM system
must provide a simple, uniform experience to users while
supporting multiple operators and technologies.
C. OpenID
Figure 3: Single Sign-On [11]
OpenID was started in 2005, current version OpenID 2.0
Somorovsky et al investigated fourteen models of SAML and protocol used XRDS, HTTP in which user registered is
standard and they founded many security problems that not required. Its main purpose is to provide Single-Sign On
related to Extensible Mark-up Language (XML) signature for consumers and currently used in Google, Yahoo,
Facebook. OpenID is a Safe, Faster, and Easier way to Sign
wrapping. WS-Security and REST based SSO use SAML
IN to websites. OpenID is a decentralized model for identity
assertion for making security statement between subjects
management, which allows service providers to delegate the
[13]. Wang performed security analysis of three
authentication of users to identity providers. In this model,
commonly
the identity of a user is represented by a URL, called an
available SSO, which include Microsoft Passport, OpenID
OpenID identifier. Hence, users don’t need to create a
2.0 and SAML 2.0. He highlighted some Vulnerabilities and
separate account for each site; rather, they just have to use
RT
security issues for each system with their applications. He
their OpenID identifier, and the authentication procedure
further analyzed Privacy Aware Identity Management and
will be conducted through the user’s identity provider [15].
Authentication for the Web (SAW) as two alternative
solutions for SSOs [12].According to the Yan et al, who has
IJE
D. OAuth
proposed a cryptography based federated identity with some
desirable features, to adapt with cloud computing. They
OAuth was started in 2005, OAuth 2.0 appears last year, and
harmonized hierarchical identity-based cryptography with
it is having a fast expansion. OAuth is a user-centric open
federated identity management in the cloud environment
authorization standard which provides for third party a
[14].
limited access to the user’s web resources and it does not
require an authentication procedure. The latest version of
OAuth gives access to a large category of consumers (i.e.
B . SAML
web browsers, desktop applications and smart phones).Its
main purpose is to provide the API authentication between
SAML is an XML-based framework, which was developed
applications and protocols used JSON, HTTP. The open
by OASIS Security Services Technical Committee (SSTC).
source OAuth 2.0 libraries and the OAuth2.0 compatible
The feature of SAML standard is to transfer the information
cloud sites (e.g. Facebook, Twitter, and Salesforce) prove its
about identity, authentication, attribute and authorization
development [17].
between organizations [16].SAML was started in 2001, uses
In cloud computing paradigm, the parties involved by
protocol XML, HTTP, and SOAP in which user registration
OAuth authorization protocol are: Cloud service provider,
is not required. Its main purpose is to provide Single-sign-on
OAuth third party and the user (Figure: 4).Firstly the third
for enterprise users and currently used in Google
party wants to obtain the request token from OAuth cloud
Apps.SAML has one or more strengths such as: Dominant
service provider. Authorization is made by the OAuth user
standard, Distributed model (federation), Life cycle
and then the request token is exchanged between the third
attributes of ID-FF, Privacy attributes of Shibboleth,
party and the cloud service provider. This shows the crucial
Browser based identity Federation but, it doesn’t address
capability of OAuth: to allow the users to control the access
identity requirements of web services. The Consortium for
of their resources by authorizing the access.
defining SAML standard and security is OASIS
(Organization for the Advancement of Structured
Information Standards).There is three SAML versions:
SAML 1.0, SAML 1.1 and the new major version of SAML
is 2.0 became an official OASIS standard in March 2005.
The Component of SAML is assertions, Protocols, Bindings
and Profiles. [13]. A SAML protocol could be used for
iv) Authentication
i) Identity Federation
iii) Identity provisioning/de-provisioning SAML 2.0 includes the identity life cycle attributes of
Liberty Identity Federation Framework (Liberty ID-FF)
Identity provisioning is the act of enrolling user’s accounts standard and also dominant privacy functionalities of
or credentials to a cloud service, in secure manner and on a Shibboleth 1.3 standard [24].
explicitly stated time. At the same time, that particular user
account could be de-provisioned by cancel it if it’s V. CONCLUSION
necessary. Moreover, the enterprise should be able to extend
their identity management solutions to the cloud service. Cloud Computing is an emerging technology in today’s
Identity provisioning/de-provisioning is an appropriate scenario, besides its overwhelming advantages the security
advantage in many situations [22].
RT
issue under it, is still a serious concern. Security and privacy
issue of user identities are major attractive areas of research.
iv) Authentication Requirement In this paper, we have discussed the concept of Cloud
Computing, Identity management, its standards and
IJE
After users account provisioning to the cloud services, the framework. Further, this paper discusses Identity and access
company’s users could authenticate to the Cloud service, by management, its requirement and existing IAM solutions.
confirming that the access identity entities which were Identity and access management is essential in cloud
found in the provisioning process. Authentication computing and helps in the management and remote access
requirement is essential as it eliminates the attack’s risks to of user’s credentials.
enter into cloud services [22]. REFERENCES
IAM Life Cycle
1. Mell, P., and Grance, T. 2011. The NIST definition of Cloud
computing (draft), NIST. [Online]. Available:
The management of user identity and access control http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-
permissions can be analyzed as multiple stages. The IAM 145_Cloud-definition.pdf.
life cycle (figure: 5) illustrates the stages that users follow 2. Suresh Kumar RG1, S.Saravanan2, Soumik Mukherjee 3,”
recommendations for implementing cloud computing management
when they join an organization and obtain access to the platforms using open source”, IJCET, Volume 3, Issue 3, October -
tools, assets required to do their jobs. The IAM life cycle December (2012), pp. 83-93.
also includes stages to ensure that employees hold 3. Sun (2009a) A Guide to Getting Started with Cloud Computing.
appropriate access as they go within the organization with SunWhite paper. https://www.sun.com/offers/docs/cloud_computing.
access being revoked or modified when they separate or 4. Cloud Computing – A Practical Approach by Velte, Tata McGraw-
Hill Edition (ISBN-13:978-0-07-068351-8).
change their roles. 5. Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M.,
Othmane, L. Ben and Lilien, L. 2010. An entity-centric approach for
privacy and identity management in Cloud computing. In Proceedings
of the 29th IEEE Symposium on. IEEE in Reliable Distributed
System.
6. Wikipedia. 2010. Identity management systems.
[Online].avilable:http://en.wikipedia.org/wiki/Identity_management_s
ystems.
7. Rizwana Shaikh, M. Sasikumar, “Identity Management in Cloud
Computing”, International Journal of Computer Applications (0975 –
8887) Volume 63-No.11, February 2013.
8. Kandukuri, B.R., Paturi, R.V., Rakshit, A.: Cloud Security Issues. In:
IEEE International Conference on Services Computing, Bangalore,
pp. 517–520 (2009).
9. K. Cameron, “The Laws of Identity,” Identity Blog,
2005;www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.p
df.
10. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H.,
Konwinski, A., Lee, G., Petterson, D.A., Rabkin, A., Stoica, I.,
Zaharia, M.: Above the Clouds: A Berkely View of Cloud
Computing. Technical Report No. UCB/EECS-2009-28, Berkely
Electrical Engineering and Computing Science, University of
California, Berkely (2009).
11. OASIS, SAML V2.0 Executive Overview (online) OASIS (2005a),
http://www.oasis-open.org/committees/download.php/13525/ Sstc-
saml-exec-overview-2.0-cd-01-2col.pdf (accessed November 10,
2010).
12. Wang, "An Analysis of Web Single Sign-On," 2011.
13. J. Somorovsky, A. Mayer, A. Worth, J. Schwenk, M. Kampmann, and
M. Jensen, “On breaking SAML: Be whoever you want to be,” In
WOOT, 2012.
14. L. Yan, C. Rong, and G. Zhao, "Strengthen cloud computing security
with federal identity management using hierarchical identity based
cryptography," in 1st International Conference on Cloud Computing,
CloudCom 2009, December 1, 2009 - December 4, 2009, Beijing,
China, 2009, pp. 167-177.
15. Nunez, D., Agudo, I., and Lopez, J. 2012. Integrating openid with
proxy re-encryption to enhance privacy in Cloud-based identity
services. In Proceedings of the IEEE 4th International Conference on
Cloud Computing Technology and Science (CloudCom).
16. OASIS, Security Assertion Markup Language (SAML) V2.0
Technical Overview (online) OASIS (2008), http://www.oasis-
open.org/committees/download.php/20645/sstc-saml-tech-overview-
2%200-draft-10.pdf (accessed November 10, 2010).
17. Wu, W., Zhang, H., Li, Z.: Open Social based Collaborative Science
Gateways. In: 11th IEEE/ACM International Symposium on Cluster,
RT
Cloud and Grid Computing (CCGrid), pp. 554–559 (2011).
18. Roshni Bhandari, Upendra Bhoi, Dhiren Patel,” Identity Management
Frameworks for Cloud”, International Journal of Computer
Applications (0975 – 8887) Volume 83 – No 12, December 2013.
IJE