Federated IdM Across Heterogeneous Clouding Environment

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Advertisements

System Center 2012 R2 Overview
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Security in Cloud Computing Presented by : Ahmed Alalawi.
Plan Introduction What is Cloud Computing?
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
Introduction to Cloud Computing
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
RESERVOIR RESERVOIR Resources and Services Virtualization without Barriers Philippe Massonet (CETIC)
Cloud Computing Use Case Draft v2.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
Exploring opportunities in the OGSA service model– realising Utility Computing Jeffrin J. Von Reich Chief architect Hewlett Packard Software Global Unit.
Introduction To Cloud Computing By Diptee Chikmurge And Minakshi Vharkate Asst.Professor MIT AOE Alandi(D),Pune.
Issues in Cloud Computing. Agenda Issues in Inter-cloud, environments  QoS, Monitoirng Load balancing  Dynamic configuration  Resource optimization.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Clouding with Microsoft Azure
Distributed Virtualization for Net-Centric Operations Draft
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Understanding The Cloud
ClearAvenue, LLC Headquartered in Columbia, Maryland
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
VPN Extension Requirements for Private Clouds
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Cloud Security– an overview Keke Chen
VIRTUALIZATION & CLOUD COMPUTING
IOT Critical Impact on DC Design
Cloud computing-The Future Technologies
Data and Applications Security Developments and Directions
2016 Citrix presentation.
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Introduction to Cloud Computing
Cloud Computing.
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Let’s get Started with Your AWS Account
Management of Virtual Execution Environments 3 June 2008
CNIT131 Internet Basics & Beginning HTML
Mobile edge computing Report by Weiqing huang.
Company Overview & Strategy
Cloud Computing Dr. Sharad Saxena.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Data Security for Microsoft Azure
Goals Introduce the Windows Server 2003 family of operating systems
Outline Virtualization Cloud Computing Microsoft Azure Platform
Emerging technologies-
Basics of Cloud Computing
Microsoft Virtual Academy
Presentation transcript:

Federated IdM Across Heterogeneous Clouding Environment 20th meeting CJK UNIOT-WG Nov. 24-26, 2010 Tokyo China Communications Standards Association Jing Wu wujing@mail.ritt.com.cn

Content 1 Background 2 Challenges of IdM in the Cloud 3 Federated IdM cross heterogeneous environment 4 Summary

Cloud Computing: over the telco network and the internet How is the internet hop breached? What is required from the telco network operator to support Cloud Computing traffic? Bandwidth on demand? QoS assurance? Addressing? Synchronization? Telecom Network Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically scalable and often virtualized resources. Cloud computing is an approach to delivering IT services that promises to be highly agile and lower costs for consumers and enterprises.Most cloud computing infrastructures consist of services delivered through common centers and built on servers. Enterprise data center

Identity Management (IdM) is an Essential Infrastructure of ICT IdM is A set of functions and capabilities (e.g., administration, management and maintenance, discovery, communication exchanges, correlation and binding, policy enforcement, authentication and assertions) used for assurance of identity information (e.g., identifiers, credentials, attributes); assurance of the identity of an entity and supporting business and security applications. Identity Management is becoming an essential basis for transaction, communication and governance; it has been an infrastructural brick in generalized convergence of communication (specialized convergence of fixed and mobile), information and Internet services as well. Identity-based services are exponentially increasing and available on many different services platforms; Next-Generation business model for network operators demands subscriber-centric data consolidation; Identity management is an essential infrastructure for both telecomunication network and the Internet.

Challenges of IdM on Cloud Computing Potential security risk clients prefer to integrate with client's identity management systems for SSO, user authentication, authorization, accounting, audit, provisioning, role management, and governance than share with others in public infrastructure. New business model Dedicated and multi-tenant model provide sharply different storage and virtualized layering techniques for data isolation and application partitioning in response to clients security risk concerns. Lack of industry standards Ensure to provide seamless integration with idm function, the cloud providers have to offer standard-based and identity-based security services . More challenges we will be facing with the emerging complex cloud computing circumstances.

Challenges of IdM Mechanisms In new cloud computing, users authentication, authorization, accounting mechanism have to been re-invent over their cloud services in contrast to the legacy datacenter, hosting, enterprise inhouse services. Users must be strongly authenticated to validate their identity All user interactions must be logged to ensure non-repudiation User accounts must be de-provisioned in a timely manner Dormant accounts must be identified and removed quickly Access permissions must be certified on a continuous basis

Federated IdM Cross Heterogeneous Environment The datacenter requests Cloud 1’s service catalog of the type of service, its configuration details, SLA details, network security, etc. Cloud 2 provides extra computing capacity to Cloud 1 when the datacenter’s request exceeded 1’s capacity. There is the basic federated IdM cross the heterogeneous environment. The broker federates resources from C1 and C2. Federation of indentities maintained by multiple Service providers on the cloud is very critical to cloud based service composition and application integration.

New Dimensions of IdM in the Clouds SaaS requires application access; Paas requires system access; Both require a common IdM that can integrate into the existing authentication mechanisms. Microsoft Windows based authentication LDAP authentication OpenID Oauth etc..

4.Summary IdM is an important infrastructure of ICT systems. A lot of new technologies of cloud computing are emerging rapidly and how to combine the IdM and the cloud is a new trend. Federated IdM solutions is to be a complete all-round solution addressing all possible issues of cloud IdM. Need to launch the IdM in the cloud research, especially in the Internet-of-things environment.

Supplementary Slides

Weblinks ITU-T Identity Management web page - http://www.itu.int/ITU-T/studygroups/com17/idm.html Join coordination activity for identity management http://www.itu.int/ITU-T/jca/idm/ OASIS http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=id-cloud

Thanks for your Attention!