A Model Apporach for Identity and Access Management (IAM) System in the Cloud
Anil Kumar1, Abhay Bhatia2, Anju Mishra3, Tanu Gupta4

1Dr. Anil Kumar, Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.

2Dr. Abhay Bhatia, Department of Computer Science & Engineering, RIT, Roorkee (Uttarakhand), India.

3Dr. Anju Mishra, Department of Information Technology, AKGEC, Ghaziabad (U.P.), India.

4Tanu Gupta, Department of Information Technology, AKGEC, Ghaziabad (U.P.), India.

Manuscript received on 02 January 2024 | Revised Manuscript received on 10 January 2024 | Manuscript Accepted on 15 January 2024 | Manuscript published on 30 January 2024 | PP: 28-36 | Volume-13 Issue-6, January 2024 | Retrieval Number: 100.1/ijsce.D364514040924 | DOI: 10.35940/ijsce.D3645.13060124

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Through use of cloud computing, information may be accessible from a range of different types of devices. It is now possible to communicate with a company at any time or location, regardless of location or time zone. Using the cloud has a number of advantages, some of which include lower expenditures on information technology and infrastructure expenses, more agility, and improved continuity planning. These benefits can only be attained via the implementation of a reliable identity and access control system for cloud applications and services. Managing these identities and limiting the access that cloud clients and applications have continues to be a significant challenge in the modern day. In order to strengthen the protection offered by a venture, it is necessary to set up a trust worthy identity and access management (IAM) system in the cloud. The findings of this study provide an intelligent and reliable IAM system that is based on cloud computing.

Keywords: IAM, Cloud Computing, Access Control System, Reliable Identity, SAML, SPML, XACML

Scope of the Article: Cloud Computing and Networking