Multi-tenancy access control strategy for cloud services

被引:0
|
作者
Zou, Maoyang [1 ]
He, Jia [1 ]
Wu, Qian [2 ]
机构
[1] Chengdu Univ Informat Technol, Sch Comp Sci, Chengdu, Peoples R China
[2] Chengdu Univ Informat Technol, Cloud Comp United Open Lab, Chengdu, Peoples R China
关键词
Cloud Services; Access Control; Multi-tenancy;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the industrial world, the access control is still mostly based on traditional "Role-Based Access Control" for cloud services. Cloud Computing United Open Laboratory in Chengdu University of Information Technology develops "the large virtualization infrastructure platform for cloud data center" which realizes access control strategy according to the characteristics of the multi-tenancy.Firstly,the main multi-tenancy access control technology is studied.Secondly,the paper describes the design for multi tenancy access control strategy, including tags, authorization strategy and property update strategy. Finally, it discusses the implementation framework of multi tenancy access control strategy.
引用
下载
收藏
页码:258 / 261
页数:4
相关论文
共 50 条
  • [21] An A-RBAC Mechanism for a Multi-Tenancy Cloud Environment
    Yang, Ta-Chih
    Guo, Ming-Huang
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [22] Towards a Multi-tenancy aware Cloud Service Composition
    Sellami, Wael
    Kacem, Hatem Hadj
    Kacem, Ahmed Hadj
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 404 - 409
  • [23] Enhanced Cloud Patterns: A Case Studyof Multi-tenancy Patterns
    Adewojo, A. A.
    Bass, J. M.
    Allison, I. K.
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 53 - 58
  • [24] SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
    Dessouky, Ghada
    Sadeghi, Ahmad-Reza
    Zeitouni, Shaza
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 487 - 506
  • [25] Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol
    Abd, Sura Khalil
    Salih, Rawia Tahrir
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol B. H. J.
    Yussof, Salman
    TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [26] A systematic review of scheduling approaches on multi-tenancy cloud platforms
    Ru, Jia
    Yang, Yun
    Grundy, John
    Keung, Jacky
    Hao, Li
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 132 (132)
  • [27] Towards Bandwidth Guarantee In Multi-tenancy Cloud Computing Networks
    Zhu, Jing
    Li, Dan
    Wu, Jianping
    Liu, Hongnan
    Zhang, Ying
    Zhang, Jingcheng
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [28] Resource management for bursty streams on multi-tenancy cloud environments
    Tolosana-Calasanz, Rafael
    Angel Banares, Jose
    Pham, Congduc
    Rana, Omer F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 444 - 459
  • [29] Multi-Tenancy Cloud-Enabled Small Cell Security
    Abubakar, Babangida Albaba
    Mouratidis, Haralambos
    2019 2ND INTERNATIONAL CONFERENCE OF THE IEEE NIGERIA COMPUTER CHAPTER (NIGERIACOMPUTCONF), 2019, : 257 - 262
  • [30] Cryptographic Multi-Tenancy: Reducing Risk in Cloud Computing Environments
    Johnson, Robert
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, 2011, : 303 - 306