{"id":2134,"date":"2019-09-18T12:57:04","date_gmt":"2019-09-18T12:57:04","guid":{"rendered":"http:\/\/tutorsindia.com\/academy\/?p=2134"},"modified":"2022-12-15T10:33:38","modified_gmt":"2022-12-15T10:33:38","slug":"tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud","status":"publish","type":"post","link":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/","title":{"rendered":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud"},"content":{"rendered":"\n<h4><a style=\"color: #7694cb;\" href=\"#\" data-wplink-edit=\"true\">Engineering &amp; Technology<\/a><\/h4>\n\n\n\n<p><h2><strong>Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud<\/strong><\/h2>Sep 18, 2019<\/p><\/br>\n\n\n\n<h3>RESEARCH REPORT<\/h3>\n<div class=\"pdffile\">\n<p><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><button>View Full Report <i class=\"fa fa-eye 3x\"><\/i><\/button><\/a><\/p>\n<\/div>\n<h1><strong>In Brief:<\/strong><\/h1>\n\n\n\n<h2>General background<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;With the ascent of Cloud Computing (CC), a huge number of clients and different applications have looked to speak with one another, swapping sensitive information (Werner, Westphall, &amp; Westphall, 2017). In consequences, for efficiently managing various resources and applications, the use of tools and models is significant for securely managing different user identities as well as avoiding compromising data privacy. For this, most of them suggested a federated identity management process which utilizes the privacy appliances towards assisting in consistence with current legislation. In the section, we analyse the privacy and security issues in cloud identity management and relating the features and challenges. At the end we discuss brief note of recommendation for Developing Secure and Flexible Management Policy for both multiple Users and cloud system.<\/p>\n\n\n\n<i><b>See also: <b><u><a href=\"https:\/\/tutorsindia.com\/academy\/recent-trends\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\">Security and Privacy Issues over the Cloud Environment<\/a><\/u><i><br\/>\n\n\n\n<i><b>See also: <b><u><a href=\"https:\/\/tutorsindia.com\/academy\/recent-trends\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control-how-machine-learning-algorithms-helps-to-improve-security\/\">Secure Access Control Framework for Fully Fledged Network Security Control<\/a><\/u><i><br\/><br\/>\n\n\n\n<h2>Significance and need of identity management and fine-grained access control policies<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Generally, the CC improves the managing capability of computing sources through merging the concepts like on-demand use, elasticity and resource allocation in a dynamic manner (Eludiora et al., 2011).  However, for multiple users, cloud system and huge amount of data in the field of big data application becomes complex  (Subashini &amp; Kavitha, 2011) wherein the concern of privacy issues. In this perspective, Identity and Access Management (IAM) is frequently used towards providing access control facilities and control identity of data. Few of the identity management (IM) tools utilizes with appropriate individualities (S. Singh, Jeong, &amp; Park, 2016) by considering various mechanism for addressing privacy issues. But, till there is an issue like user data leakage, lack of control on the dissemination of personal information are recurring and distribution of unnecessary attributes in cloud environments (Castiglione et al., 2015; A. Singh &amp; Chatterjee, 2015). So, to obtain cloud identity management as well as met the present regulation, the providers should protect the user privacy, data, entities and data throughout their lifecycle. (Indu, Anand, &amp; Bhaskar, 2018; Werner et al., 2017). This identity management procedure will meet the requirement fine-grained access control process and user flexibility of data access. <\/p>\n\n\n\n<div class=\"wp-block-image zoom\"><figure class=\"aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" width=\"671\" height=\"411\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/ff.png\" alt=\"\" class=\"wp-image-2149\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/ff.png 671w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/ff-600x368.png 600w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/ff-300x184.png 300w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><figcaption><br><em> Figure 1: <\/em>Overview of Cloud Storage System Based on Characteristics, Need and Challenges <\/figcaption><\/figure><\/div>\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;IM components dealt with the need for authorization and authentication Legillon et al. (2013) in the cloud environment (Oliveira, Trinta, Vieira, &amp; Cortes, 2018). The pictorial representation of Cloud Storage System with respect to the system Characteristics, Need and Challenges are discussed in figure 1. <\/p>\n\n\n\n<h2>Authentication (AN)<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;The term AN is defined as the process of approving an entity via other entity which is used to ensure whether the application or person is   qualified for claiming or accessing data. The common AN approaches are third party authentication, 3D password objects, digital device authentication, multifactor authentication, simple text passwords, biometric authentication and graphical passwords. Nowadays, cloud access consent is granted via the IM system (Butun, Erol-Kantarci, Kantarci, &amp; Song, 2016; Indu et al., 2018). <\/p>\n\n\n\n<figure class=\"wp-block-video alignright\"><video height=\"720\" style=\"aspect-ratio: 1280 \/ 720;\" width=\"1280\" autoplay controls muted src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Video.mp4\"><\/video><\/figure>\n\n\n\n<h2>Authorization (AR)<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Based on the authenticated user\u2019s entitlements, the AR will be disagreeing or permitting access to a particular resource. AR decides like what applications or which user is permitted to make on system and application\/user identity data are used for decision making  (Khan et al., 2014). The cloud network comprises various service providers in which a single user can access various services at same time whereas each service from various security levels and service provider (Indu et al., 2018).<\/p>\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;For ensuring the valid user\u2019s access (for various services and resources) in IAM system, an access control governance cloud service provider (CSPs) defines the set of policies which is relevant to the access control. To meet the objective of each organization, CSPs should ensure the significant features such as Governance, Risk Management and Compliance (GRC) (Indu et al., 2018; Zhang, Zheng, Li, Li, &amp; Li, 2016).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/www.tutorsindia.com\/our-services\/masters-dissertation-writing-services\/dissertation-topic\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg\" alt=\"\" class=\"wp-image-2195\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg 728w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-600x74.jpg 600w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-300x37.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2>Identity &amp; access management systems<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;First, the term IM is a process of managing, creating using identities and infrastructure which offered support for these processes. Also, it is capable of performing functions like discovery, policy enforcement, information exchange, administration, maintenance, management and data authentication. Each application or person identified through credential that denotes a group of attributes, delivered through reliable resources (Werner et al., 2017). <\/p>\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;To ensure the security in IAM, the data\u2019s are approved and managed by the same identity for entire applications. It is used to validate the data users, services or devices as well as have rights to access or deny data.  Moreover, it does not need its own authentication or identity to authenticate the data (Indu et al., 2018). The IAM simplifies the management of large-scale distributed systems which minimizes the application workload.<\/p>\n\n\n\n<h2>Recommendation<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;From the above points, we concluded that there is a need for effective key-based authentication to enhance the performance of flexible management for both multiple users and cloud system.  <\/p>\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Also required authorization policies for multi-party cloud infrastructure data sharing as it offers flexible and dynamic operations.<\/p>\n\n\n\n<h2>Summary<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;This section summarized and analysed the recent security, mitigations and potential threats aspects in cloud system along with the significance of data access management, identity management, services and security concern. From this we found there is a need for effective IAM mechanism for development of secure and flexible management policies which will enhance the system performance in both security and privacy concern. <\/p>\n\n\n\n\n\n\n\n        <div class=\"rmwr-wrapper\" \n             data-id=\"rmwr-69e759927692f\"\n             data-mode=\"normal\"\n             data-animation=\"fade\"\n             data-duration=\"300\"\n             data-smooth-scroll=\"true\"\n             data-scroll-offset=\"0\">\n            <button \n                type=\"button\"\n                class=\"read-link\" \n                id=\"readlinkrmwr-69e759927692f\"\n                data-open-text=\"References\"\n                data-close-text=\"References\"\n                aria-expanded=\"false\"\n                aria-controls=\"readrmwr-69e759927692f\"\n                aria-label=\"References\"\n            >\n                <span class=\"rmwr-text\">References<\/span>\n            <\/button>\n            <div \n                class=\"read_div\" \n                id=\"readrmwr-69e759927692f\"\n                aria-hidden=\"true\"\n                data-animation=\"fade\"\n                data-duration=\"300\"\n                style=\"display: none;\"\n            >\n                 \n\nButun, I., Erol-Kantarci, M., Kantarci, B., &amp; Song, H. (2016). Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communications Magazine, 54(4), 47\u201353. <br>https:\/\/doi.org\/10.1109\/MCOM.2016.7452265<br><br>\nCastiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., &amp; Huang, X. (2015). Hierarchical and Shared Access Control. IEEE Transactions on Information Forensics and Security, 11(4), 850\u2013865. <br>https:\/\/doi.org\/10.1109\/TIFS.2015.2512533<br><br>\nEludiora, S., Abiona, O., Oluwatope, A., Oluwaranti, A., Onime, C., &amp; Kehinde, L. (2011). A User Identity Management Protocol for Cloud Computing Paradigm. International Journal of Communications, Network and System Sciences, 04(03), 152\u2013163. https:\/\/doi.org\/10.4236\/ijcns.2011.43019<br><br>\nIndu, Anand, R., &amp; Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 21(4), 574\u2013588. <br>https:\/\/doi.org\/10.1016\/j.jestch.2018.05.010<br><br>\nKhan, A. N., Kiah, M. L. M., Madani, S. A., Ali, M., Khan, A. ur R., &amp; Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing, 68(2), 624\u2013651. <br>https:\/\/doi.org\/10.1007\/s11227-013-1055-z<br><br>\nLegillon, F., Melab, N., Renard, D., &amp; Talbi, E.-G. (2013). Cost minimization of service deployment in a multi-cloud environment. In 2013 IEEE Congress on Evolutionary Computation (pp. 2580\u20132587). IEEE. <br>https:\/\/doi.org\/10.1109\/CEC.2013.6557880<br><br>\nOliveira,  de C. J., Trinta, F., Vieira, D., &amp; Cortes, O. A. C. (2018). Evolutionary solutions for resources management in multiple clouds: State-of-the-art and future directions. Future Generation Computer Systems, 88, 284\u2013296.<br> https:\/\/doi.org\/10.1016\/j.future.2018.05.087<br><br>\nSingh, A., &amp; Chatterjee, K. (2015). Identity Management in Cloud Computing through Claim-Based Solution. In 2015 Fifth International Conference on Advanced Computing &amp; Communication Technologies (pp. 524\u2013529). IEEE. <br>https:\/\/doi.org\/10.1109\/ACCT.2015.89<br><br>\nSingh, S., Jeong, Y.-S., &amp; Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200\u2013222. https:\/\/doi.org\/10.1016\/j.jnca.2016.09.002\nSubashini, S., &amp; Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1\u201311.<br> https:\/\/doi.org\/10.1016\/j.jnca.2010.07.006<br><br>\nWerner, J., Westphall, C. M., &amp; Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122, 29\u201342.<br> https:\/\/doi.org\/10.1016\/j.comnet.2017.04.030<br><br>\nZhang, Y., Zheng, D., Li, Q., Li, J., &amp; Li, H. (2016). Online\/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Security and Communication Networks, 9(16), 3688\u20133702. <br>https:\/\/doi.org\/10.1002\/sec.1574<br><br>\n\n\n             <\/div>\n        <\/div>\n        \n","protected":false},"excerpt":{"rendered":"<p>Engineering &amp; Technology Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud Sep 18, 2019 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2868,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[147],"tags":[],"class_list":["post-2134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering-and-techology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends\" \/>\n<meta property=\"og:description\" content=\"Engineering &amp; Technology Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud Sep 18, 2019 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Recent-Research Trends\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-18T12:57:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-15T10:33:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"330\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tutors India\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tutors India\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\"},\"author\":{\"name\":\"Tutors India\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"headline\":\"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud\",\"datePublished\":\"2019-09-18T12:57:04+00:00\",\"dateModified\":\"2022-12-15T10:33:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\"},\"wordCount\":1326,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png\",\"articleSection\":[\"Engineering And Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\",\"name\":\"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png\",\"datePublished\":\"2019-09-18T12:57:04+00:00\",\"dateModified\":\"2022-12-15T10:33:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png\",\"contentUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png\",\"width\":330,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tutorsindia.com\/academy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/\",\"name\":\"Recent-Research Trends\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\",\"name\":\"Tutors India\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"caption\":\"Tutors India\"},\"url\":\"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends","og_description":"Engineering &amp; Technology Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud Sep 18, 2019 [&hellip;]","og_url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/","og_site_name":"Recent-Research Trends","article_published_time":"2019-09-18T12:57:04+00:00","article_modified_time":"2022-12-15T10:33:38+00:00","og_image":[{"width":330,"height":186,"url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png","type":"image\/png"}],"author":"Tutors India","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tutors India","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/"},"author":{"name":"Tutors India","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"headline":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud","datePublished":"2019-09-18T12:57:04+00:00","dateModified":"2022-12-15T10:33:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/"},"wordCount":1326,"commentCount":0,"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png","articleSection":["Engineering And Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/","url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/","name":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud - Recent-Research Trends","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png","datePublished":"2019-09-18T12:57:04+00:00","dateModified":"2022-12-15T10:33:38+00:00","author":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"breadcrumb":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#primaryimage","url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png","contentUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png","width":330,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tutorsindia.com\/academy\/"},{"@type":"ListItem","position":2,"name":"Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.tutorsindia.com\/academy\/#website","url":"https:\/\/www.tutorsindia.com\/academy\/","name":"Recent-Research Trends","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8","name":"Tutors India","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","caption":"Tutors India"},"url":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"landscape":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"portraits":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"thumbnail":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2-150x150.png",150,150,true],"medium":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2-300x169.png",300,169,true],"large":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"1536x1536":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"2048x2048":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"rdtheme-size1":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"rdtheme-size2":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"rdtheme-size3":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"rdtheme-size6":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2.png",330,186,false],"rdtheme-size8":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2-92x92.png",92,92,true],"rdtheme-size5":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2-150x100.png",150,100,true],"rdtheme-size4":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/secure-and-flexible-management-2-80x62.png",80,62,true]},"rttpg_author":{"display_name":"Tutors India","author_link":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.tutorsindia.com\/academy\/category\/engineering-and-techology\/\" rel=\"category tag\">Engineering And Technology<\/a>","rttpg_excerpt":"Engineering &amp; Technology Tips For Developing Secure And Flexible Management Policy For Multiple Users Over The Cloud Sep 18, 2019 [&hellip;]","_links":{"self":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/comments?post=2134"}],"version-history":[{"count":0,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2134\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media\/2868"}],"wp:attachment":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media?parent=2134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/categories?post=2134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/tags?post=2134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}