Skip to main content

Authentication and Trust: Turning the Cloud inside out

  • Chapter
ISSE 2010 Securing Electronic Business Processes

Abstract

There is no doubt that enterprises of all sizes are moving more of their critical business applications into the cloud, relying on services such as SalesForce.com, Google Apps and Amazon Web Services to organise and protect their core business data.

It is also true to say that very few enterprises base their entire infrastructure in the cloud. There is almost always a part of the IT core which is managed and protected in house, leading to a hybrid approach to cloud computing.

In any given enterprise, the split between in house and in cloud infrastructure speaks volumes about that organisation’s perception of the cloud. Often, the single part of the enterprise IT infrastructure to be retained in house is the authentication and identity management system.

This paper puts forward the argument that authentication and identity management should in fact be the first element of an enterprise infrastructure to be moved into the cloud. Only then will the cloud model realise its full potential of zero footprint in house, finally setting organisations free to focus on their core business.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance, 2009

    Google Scholar 

  • Top Threats to Cloud Computing v1.0, Cloud Security Alliance, 2010

    Google Scholar 

  • The NIST Definition of Cloud Computing v15, NIST 2009

    Google Scholar 

  • Top Ten disruptive technologies for 2008 to 2012, Gartner 2008

    Google Scholar 

  • Survey Finds Businesses Have Big Plans for Cloud Computing, Version 1.0, ReliaCloud/Evalueserve 2010

    Google Scholar 

  • Cloud Security Alliance and Novell deliver first vendor-neutral Trusted Security Certification program to spur mainstream cloud adoption, CSA Press Release 2010

    Google Scholar 

  • TriCipher to Offer Triple-Strength Protection With VeriSign for Google Apps Accounts , TriCipher Press Release 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Brindley, C. (2011). Authentication and Trust: Turning the Cloud inside out. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2010 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9788-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9788-6_7

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-1438-8

  • Online ISBN: 978-3-8348-9788-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics