Access control delegation for the Cloud

被引:0
|
作者
Fotiou, Nikos [1 ]
Machas, Apostolis [1 ]
Polyzos, George C. [1 ]
Xylomenos, George [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, Mobile Multimedia Lab, Athens, Greece
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become the focus of attention in the industry, from the point of view of both providers and customers, as well as researchers. However, security concerns still impede the widespread adoption of this technology. Most enterprises are particularly worried about the lack of control over their outsourced data since the authentication and authorization systems of Cloud providers are generic and they cannot be easily adapted to the requirements of each individual enterprise. An adaptation process requires the creation of complex protocols, often leading to security problems and "lock-in" conditions. In this paper we present the design of a lightweight solution that overcomes these problems. We have implemented and incorporated this solution in a popular open-source Cloud stack: OpenStack. Our solution eliminates the need for developing complex adaptation protocols, offers data owners the flexibility to switch among Cloud providers, or use multiple, different Cloud providers concurrently, and enhances end-user privacy.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [41] A New Approach to Access Control in Cloud
    Habiba, Mansura
    Islam, Md. Rafiqul
    Ali, A. B. M. Shawkat
    Islam, Md. Zahidul
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 1015 - 1030
  • [42] On Access Control of Cloud Service Chains
    Abbasi, Khurrum Mustafa
    ul Haq, Irfan
    Malik, Ahmad Kamran
    Khalid, Shehzad
    Fazil, Saba
    Durad, Hanif
    17TH IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2014, 2014, : 293 - 298
  • [43] AN OPTIMIZED SUCDDES TO CONTROL ACCESS IN CLOUD
    Rani, P. Jhansi
    Akkalakshmi, M.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 91 - +
  • [44] Dynamic Access Control in Cloud Services
    Zaborovsky, Vladimir
    Lukashin, Alexey
    Kupreenko, Sergey
    Mulukha, Vladimir
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1400 - 1404
  • [45] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [46] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
  • [47] Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)
    Servos, Daniel
    Osborn, Sylvia L.
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 320 - 328
  • [48] Reasoning about Dynamic Delegation in Role Based Access Control Systems
    Ruan, Chun
    Varadharajan, Vijay
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, 2011, 6587 : 239 - 253
  • [49] A context-based delegation access control model for pervasive computing
    Liscano, Ramiro
    Wang, Kaining
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 44 - +
  • [50] A Modeling Approach supporting Access Control Delegation in a Disaster Management Context
    Gaaloul, Khaled
    Proper, Henderik A.
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 263 - 268