Authentication and Trust: Turning the Cloud inside out

  • Christian Brindley


There is no doubt that enterprises of all sizes are moving more of their critical business applications into the cloud, relying on services such as, Google Apps and Amazon Web Services to organise and protect their core business data.

It is also true to say that very few enterprises base their entire infrastructure in the cloud. There is almost always a part of the IT core which is managed and protected in house, leading to a hybrid approach to cloud computing.

In any given enterprise, the split between in house and in cloud infrastructure speaks volumes about that organisation’s perception of the cloud. Often, the single part of the enterprise IT infrastructure to be retained in house is the authentication and identity management system.

This paper puts forward the argument that authentication and identity management should in fact be the first element of an enterprise infrastructure to be moved into the cloud. Only then will the cloud model realise its full potential of zero footprint in house, finally setting organisations free to focus on their core business.


Cloud Computing Cloud Service Cloud Provider Security Service Cloud Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance, 2009Google Scholar
  2. Top Threats to Cloud Computing v1.0, Cloud Security Alliance, 2010Google Scholar
  3. The NIST Definition of Cloud Computing v15, NIST 2009Google Scholar
  4. Top Ten disruptive technologies for 2008 to 2012, Gartner 2008Google Scholar
  5. Survey Finds Businesses Have Big Plans for Cloud Computing, Version 1.0, ReliaCloud/Evalueserve 2010Google Scholar
  6. Cloud Security Alliance and Novell deliver first vendor-neutral Trusted Security Certification program to spur mainstream cloud adoption, CSA Press Release 2010Google Scholar
  7. TriCipher to Offer Triple-Strength Protection With VeriSign for Google Apps Accounts , TriCipher Press Release 2009Google Scholar

Copyright information

© Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH 2011

Authors and Affiliations

  • Christian Brindley
    • 1
  1. 1.EMEA – VeriSign EuropeLondonUnited Kingdom

Personalised recommendations