Abstract
There is no doubt that enterprises of all sizes are moving more of their critical business applications into the cloud, relying on services such as SalesForce.com, Google Apps and Amazon Web Services to organise and protect their core business data.
It is also true to say that very few enterprises base their entire infrastructure in the cloud. There is almost always a part of the IT core which is managed and protected in house, leading to a hybrid approach to cloud computing.
In any given enterprise, the split between in house and in cloud infrastructure speaks volumes about that organisation’s perception of the cloud. Often, the single part of the enterprise IT infrastructure to be retained in house is the authentication and identity management system.
This paper puts forward the argument that authentication and identity management should in fact be the first element of an enterprise infrastructure to be moved into the cloud. Only then will the cloud model realise its full potential of zero footprint in house, finally setting organisations free to focus on their core business.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance, 2009
Top Threats to Cloud Computing v1.0, Cloud Security Alliance, 2010
The NIST Definition of Cloud Computing v15, NIST 2009
Top Ten disruptive technologies for 2008 to 2012, Gartner 2008
Survey Finds Businesses Have Big Plans for Cloud Computing, Version 1.0, ReliaCloud/Evalueserve 2010
Cloud Security Alliance and Novell deliver first vendor-neutral Trusted Security Certification program to spur mainstream cloud adoption, CSA Press Release 2010
TriCipher to Offer Triple-Strength Protection With VeriSign for Google Apps Accounts , TriCipher Press Release 2009
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH
About this chapter
Cite this chapter
Brindley, C. (2011). Authentication and Trust: Turning the Cloud inside out. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2010 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9788-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9788-6_7
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-1438-8
Online ISBN: 978-3-8348-9788-6
eBook Packages: EngineeringEngineering (R0)