Cloud computing security: Difference between revisions

Content deleted Content added
Dimensions of cloud security: gave it a title, a publisher and dates.
Security and privacy: added author, publisher and dates
Line 46:
 
===Identity management ===
Every enterprise will have its own [[identity management system]] to control access to information and computing resources. Cloud providers either integrate the customer's identity management system into their own infrastructure, using [[Federated identity management|federation]] or [[Single sign-on|SSO]] technology or a biometric-based identification system,<ref name="cloudid"/> or provide an identity management system of their own.<ref name=DR_1>{{cite magazineweb| title=Identity Management In The Cloud| author=Chickowski, E.| url=httphttps://www.darkreading.com/cybersecurity-analytics/identity-management-in-the-cloud/d/d-id/1140751 |title=Identity Management in the Cloud |magazinepublisher=Information WeekInforma PLC| date=2013-10-25 October 2013| access-date=6 December 2013-06-05}}</ref> CloudID,<ref name="cloudid"/> for instance, provides privacy-preserving cloud-based and cross-enterprise biometric identification. It links the confidential information of the users to their biometrics and stores it in an encrypted fashion. Making use of a searchable encryption technique, biometric identification is performed in the encrypted ___domain to make sure that the cloud provider or potential attackers do not gain access to any sensitive data or even the contents of the individual queries.<ref name="cloudid"/>
 
===Physical security===