Unit-2 (Cloud Computing Arch2)
Unit-2 (Cloud Computing Arch2)
Identity
Identity refers to set of attributes associated with something to make it recognizable. All
objects may have same attributes, but their identities cannot be the same. A unique identity is
assigned through unique identification attribute.
There are several identity services that are deployed to validate services such as validating
web sites, transactions, transaction participants, client, etc. Identity-as-a-Service may include
the following:
Directory services
Federated services
Registration
Authentication services
Risk and event monitoring
Single sign-on services
Identity and profile management
Single Sign-On (SSO)
To solve the problem of using different username and password combinations for different
servers, companies now employ Single Sign-On software, which allows the user to login
only one time and manage the access to other systems.
SSO has single authentication server, managing multiple accesses to other systems, as shown
in the following diagram:
SSO Working
There are several implementations of SSO. Here, we discuss the common ones:
OpenID
It offers users to login into multiple websites with single account. Google, Yahoo!, Flickr,
MySpace, WordPress.com are some of the companies that support OpenID.
Benefits
Increased site conversation rates
Access to greater user profile content
Fewer problems with lost passwords
Ease of content integration into social networking sites
What are the Benefits of IDaaS
Reduce costs. Using a cloud-based IDaaS solution eliminates the need for equipment
purchases, specialized IT staff and ongoing training, allowing your IT team to stay
focused on day-to-day operations.
Better user experiences. Single sign-on and multi-factor authentication let users login
with a single set of credentials, which reduces friction and password reset assistance.
Increase revenue and customer loyalty. A good first impression from a smooth login
process leads to more customer interactions and sales.
Strengthen security. Outsourcing your IAM solution to experts limits the ability of
bad actors with compromised credentials from entering your system and stealing
data.
Scalable to meet your needs. Cloud-based subscription services adapt easily to
changing user bases, such as an influx of new customers for events and promotions.
Risk mitigation. Identity solutions reduce your risk of a data breach, which could
cost your organization millions of dollar.
Compliance as a Service (CaaS) in Cloud Computing
Compliance as a Service (CaaS) is a type of solution that uses cloud computing to help
businesses store data and manage regulatory compliance. Though services may vary
depending on the industry, CaaS providers typically store sensitive data in accordance with
regulations and provide tools for managing and reporting compliance in your organization.
Cloud compliance issues occur as any cloud consumer make use of cloud storage and
backup services. Cloud computing by its very nature extents various jurisdictions. The laws
of the country of request from where it originates many not necessarily match the laws of
the country in which the request is being processed, and probably laws of neither location
match the laws of the country in which the service is delivered. Compliance is beyond than
a basically provided an unidentified service token to an identity so that access to a resource
can be obtain. Compliance is a difficult issue which needs considerable expertise.—
The major services that should provided additionally in a Compliance as a Service (CaaS)
offering:
1. Database access control
2. Separation of duties
3. Annual risk assessment
4. Application management
5. Change control
6. Data discovery
7. Data masking
8. Incident response
9. Policy creation and enforcement
10.Real-time data protection
11.Repair of vulnerabilities
12.Personnel training
13.Service configuration
Advantages of Compliance as a Service (CaaS) –
1. In cloud, Encryption is quite arduous to track which is simplified by the Compliance as a
Service. To fulfill the needs of end user and organizations around governance including
compliance, they use a cloud provider’s service. These services deliver pre-built
behaviors with specific regulations, such as needed encryption levels.
2. Compliance as a Services are configurable i.e. no development is required. This is cost
effective for the organizations and it reduce the maintenance along with changing
regulations, as well as internal and external policies of the corporations.
Disadvantages of Compliance as a Service (CaaS) –
1. Cloud service consumers will be held responsible for any issues with the compliance
services. Its mandatory that customer validate the compliance services to ensure that
there are no issues.
2. It is impossible to Compliance as a Service providers to support all the regulations
among all the countries. Also, as all the services are cloud based then there is always a
risk that providers will stop to providing the services at any time because of low uses of
their services. So, end-user and organization become dependent on service providers.
Overall these are some critical aspects which falls under drawbacks of CaaS.