A Model for Trust-Based Access Control and Delegation in Mobile Clouds

被引:0
|
作者
Ray, Indrajit [1 ]
Mulamba, Dieudonne [1 ]
Ray, Indrakshi [1 ]
Han, Keesook J. [2 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
[2] Air Force Res Lab RIGA, Rome, NY 13441 USA
关键词
access control model; delegation; mobile cloud security; trust;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in mobile smartphone clouds such as the Android TM cloud. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and a subject's access requirements to resources may change during the course of the application execution. Cloud tenants may need to acquire permissions from different administrative domains based on the services they require. Moreover, all the entities participating in a cloud may not be trusted to the same degree. Traditional access control models are not adequate for mobile clouds. In this work, we propose a new access control framework for mobile smartphone clouds. We formalize a trust-based access control model with delegation for providing fine-grained access control. Our model incorporates the notion of trust in the Role-Based Access Control (RBAC) model and also formalizes the concept of trustworthy delegation.
引用
收藏
页码:242 / 257
页数:16
相关论文
共 50 条
  • [1] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [2] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    [J]. DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [3] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [4] Trust-Based Fuzzy Access Control Model Research
    Su, Rina
    Zhang, Yongping
    He, Zhongkun
    Fan, Shaojing
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 393 - 399
  • [5] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [6] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [7] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [8] Dealing with Delegation in a Trust-based MANET
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [9] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [10] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560