Assured Identity for The Cloud
dc.contributor.author | Daniels, Jeff | |
dc.date.accessioned | 2011-09-22T19:43:54Z | |
dc.date.accessioned | 2015-10-01T18:54:11Z | |
dc.date.available | 2011-09-22T19:43:54Z | |
dc.date.available | 2015-10-01T18:54:11Z | |
dc.date.issued | 2011-09-22T19:43:54Z | |
dc.identifier.uri | http://hdl.handle.net/10484/2031 | |
dc.description.abstract | It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloud It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudIt has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloudcomputing, and a prototype built using interoperable cloud and virtualization technologies. The research supports the 2011 U.S. Federal Cloud Computing Strategy as well as the Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) initiative. The dissertation research contributes to the body of knowledge in systems management, security, cloud computing and virtualization. | |
dc.description.statementofresponsibility | Daniels, Jeff | |
dc.language.iso | en | |
dc.subject.lcsh | Information technology. | |
dc.subject.lcsh | Cloud computing. | |
dc.subject.lcsh | Technology--Management. | |
dc.subject.lcsh | Digital communication. | |
dc.title | Assured Identity for The Cloud | |
dc.type | Dissertation | |
dc.date.graduationmonth | August | |
dc.date.published | 2011 | |
dc.description.committeechair | Beach, David | |
dc.description.committeemembers | Croft, William E | |
dc.description.committeemembers | English, Robert E | |
dc.description.committeemembers | Kinley, Edward R | |
dc.description.committeemembers | Lin, Yuetong | |
dc.description.degree | Doctor of Philosophy | |
dc.description.department | Department of Technology Management | |
dc.description.imprint | Cunningham Memorial library, Terre Haute,Indiana State University | |
dc.description.itemidetd | 20110922-002 | |
dc.description.level | Doctoral | |
dc.description.note | Title from document title page. Document formatted into pages: contains 176p.: ill. Includes bibliography, abstract and appendix | |
refterms.dateFOA | 2021-06-02T11:15:15Z |