Access control delegation for the Cloud

被引:0
|
作者
Fotiou, Nikos [1 ]
Machas, Apostolis [1 ]
Polyzos, George C. [1 ]
Xylomenos, George [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, Mobile Multimedia Lab, Athens, Greece
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become the focus of attention in the industry, from the point of view of both providers and customers, as well as researchers. However, security concerns still impede the widespread adoption of this technology. Most enterprises are particularly worried about the lack of control over their outsourced data since the authentication and authorization systems of Cloud providers are generic and they cannot be easily adapted to the requirements of each individual enterprise. An adaptation process requires the creation of complex protocols, often leading to security problems and "lock-in" conditions. In this paper we present the design of a lightweight solution that overcomes these problems. We have implemented and incorporated this solution in a popular open-source Cloud stack: OpenStack. Our solution eliminates the need for developing complex adaptation protocols, offers data owners the flexibility to switch among Cloud providers, or use multiple, different Cloud providers concurrently, and enhances end-user privacy.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [21] Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile
    Daud, Malik Imran
    Sanchez, David
    Viejo, Alexandre
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 18 - 29
  • [22] A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 57 : 241 - 256
  • [23] Experimenting with smart contracts for access control and delegation in IoT
    Tapas, Nachiket
    Longo, Francesco
    Merlino, Giovanni
    Puliafito, Antonio
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 324 - 338
  • [24] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [25] An Auto-delegation Mechanism for Access Control Systems
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 1 - 16
  • [26] Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV
    Li, Wenchao
    Xia, Chunhe
    Wang, Chen
    Wang, Tianbo
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (11) : 20187 - 20201
  • [27] Access Control Management for Cloud
    Habiba, Mansura
    Islam, Md. Rafiqul
    Ali, A. B. M. Shawkat
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 485 - 492
  • [28] Access Control for Cloud Applications
    Ye, Xinfeng
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 970 - 977
  • [29] Access control as a service for the Cloud
    Fotiou, Nikos
    Machas, Apostolis
    Polyzos, George C.
    Xylomenos, George
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6 (01)
  • [30] Delegation Enabled Provenance-Based Access Control Model
    Mohy, Noha Nagy
    Mokhtar, Hoda M. O.
    El-Sharkawi, Mohamed E.
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1374 - 1379