Access control delegation for the Cloud

被引:0
|
作者
Fotiou, Nikos [1 ]
Machas, Apostolis [1 ]
Polyzos, George C. [1 ]
Xylomenos, George [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, Mobile Multimedia Lab, Athens, Greece
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become the focus of attention in the industry, from the point of view of both providers and customers, as well as researchers. However, security concerns still impede the widespread adoption of this technology. Most enterprises are particularly worried about the lack of control over their outsourced data since the authentication and authorization systems of Cloud providers are generic and they cannot be easily adapted to the requirements of each individual enterprise. An adaptation process requires the creation of complex protocols, often leading to security problems and "lock-in" conditions. In this paper we present the design of a lightweight solution that overcomes these problems. We have implemented and incorporated this solution in a popular open-source Cloud stack: OpenStack. Our solution eliminates the need for developing complex adaptation protocols, offers data owners the flexibility to switch among Cloud providers, or use multiple, different Cloud providers concurrently, and enhances end-user privacy.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [11] A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 32 - 44
  • [12] Secure Key Storage and Access Delegation Through Cloud Storage
    Mishra, Bharati
    Jena, Debasish
    Somula, Ramasubbareddy
    Sankar, S.
    INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE, 2020, 11 (04) : 45 - 64
  • [13] Delegation of access rights in a privacy preserving access control model
    Moniruzzaman, Md
    Barker, Ken
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 124 - 133
  • [14] Access Control with Delegation for Smart Home Applications
    Le, Tam
    Mutka, Matt W.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19), 2019, : 142 - 147
  • [15] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [16] Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
    Pareek, Gaurav
    Purushothama, B. R.
    INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 251 - 271
  • [17] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [18] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [19] A Discretionary Delegation Framework for Access Control Systems
    Khan, M. Fahim Ferdous
    Sakamura, Ken
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 865 - 882
  • [20] Dynamic delegation approach for access control in grids
    Geethakumari, G
    Negi, A
    Sastry, VN
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 387 - 394