The paper claims:
"Essentially, what is needed is a proxy between the consumer and the cloud provider that allows you to create and maintain levels of authorization and monitoring far beyond what is currently available from most providers. Once this proxy is in place, it is very easy to log every action users are taking. Having a user action log contributes to overall security, facilitates recovery and helps you pass compliance audits."
Dell's product offers identity management system integration with the local/legacy user store and cloud based user stores. This is essentially the missing link between on-premise and off-premise (cloud) based solutions. The service also offers a synchronization feature that maintains consistency between user stores.
In my research, I built use cases that serve as a foundation for intermediary proxies (such as Dell's) that synchronize user attributes and user records required for authorization and fine-grained user entitlement in cloud computing environments.