G-Cloud on Openstack : Adressing access control and regulation requirements

被引:0
|
作者
Omar, Ibrahim Yonis [1 ]
Laborde, Romain [1 ]
Wazan, Ahmad Samer [1 ]
Barrere, Francois [1 ]
Benzekri, Abdelmalek [1 ]
机构
[1] Univ Paul Sabatier, Inst Rech Informat Toulouse, Toulouse, France
关键词
e-Government; e-services security; Access control; Cloud Computing; XACML; Openstack; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that e-Government applications bring several benefits to citizens in terms of efficiency, accessibility and transparency. Today, most of governments tend to propose cloud computing based e-services to their citizens. A key component in these services is the access control management issue. In this paper, we present our research works for building an access control system for the Djiboutian e-Government project that is built using Openstack framework. Specifically, we demonstrate the limitation of the integrated access control system in Openstack for the Djiboutian eGovernment access control requirements and for the compliance to the related regulation. Thus, we propose to extend the existing access control system of Openstack by integrating the features of the XACML V3 to the Openstack framework.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Modeling Access Control Requirements in Feature Model
    Sun, Lianshan
    Huang, Gang
    APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 241 - +
  • [42] Security and access control requirements for computerized systems
    McDowall, R. D.
    LC GC EUROPE, 2007, 20 (11) : 583 - 585
  • [43] Feature Modeling of the Evolving Access Control Requirements
    Kumari, K. Shantha
    Chithralekha, T.
    TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 392 - +
  • [44] Access control requirements for preventing insider threats
    Park, Joon S.
    Giordano, Joseph
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534
  • [45] A Survey on Machine Learning-based Medium access control technology for 6G requirements
    Kim, Yushin
    Ahn, Seyoung
    You, Cheolwoo
    Cho, Sunghyun
    2021 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2021,
  • [46] Study on Access Control for Cloud Storage Security
    Ma, Xinqiang
    Huang, Yi
    Zhang, Mingsheng
    Liu, Youyuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 333 - 336
  • [47] A Hierarchical Access Control Technology for Cloud Storage
    Lan, Jiang
    Chunhua, Gu
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 35 - 40
  • [48] Quantitative Policy Repair for Access Control on the Cloud
    Eiers, William
    Sankaran, Ganesh
    Bultan, Tevfik
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 564 - 575
  • [49] An Algebra for Composing Access Control Policies in Cloud
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sahana
    Faatheima, Sherein
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [50] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166