Access Control Management for Cloud

被引:9
|
作者
Habiba, Mansura [1 ]
Islam, Md. Rafiqul [1 ]
Ali, A. B. M. Shawkat [2 ]
机构
[1] Amer Int Univ Bangladesh, Dept Comp Sci, Dhaka, Bangladesh
[2] i LaB Australia, Rockhampton, Qld 4701, Australia
关键词
Cloud computing; access control; authorization; audit;
D O I
10.1109/TrustCom.2013.61
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Managing data access control in an authorized and authenticated way is still one of the key challenge in cloud security. In a complex environment like cloud, data owner and Cloud Service Provider (CSP) need to monitor continuously who is accessing which data in order to prevent unauthorized access. Moreover, it should be pre-defined that who can perform which operation on particular data, which can reduce unauthorized access to a great extent. In this regard, user's access to any data, application and services reside in cloud should be controlled, managed dynamically and monitored continuously. Most of cases the traditional system is not efficient enough to cope up with dynamic cloud environment, due to high dynamicity, data virtualization and multi-tenancy, higher scalability and higher degree of integrity. Existing systems also merely provide efficient auditing and reporting functionality regarding access control management. In this research we have designed a data intensive dynamic access control model for cloud environment. Several authorization algorithms are devised in this paper. Our proposed access control model has portrayed the system framework and different module along with their functionalities. Multi Agent based System (MAS) is represented to define the accessibility and functionality of the proposed model. Moreover, an enhanced authorization scheme is driven in this work to improve the security of the proposed system. We have also represented security and efficiency analysis of proposed models which has shown that our proposed scheme is efficient and secured enough to deals with the access control management.
引用
收藏
页码:485 / 492
页数:8
相关论文
共 50 条
  • [41] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [42] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [43] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [44] Collaborative Access Control of Cloud Storage Systems
    Chen, Yi-Hua
    Huang, Po-Chun
    PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), 2018, : 1063 - 1064
  • [45] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [46] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [47] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [48] Access Control Models for XML Databases in the Cloud
    Alfaqir, Shumukh
    Hendaoui, Saloua
    Alhablani, Fatimah
    Alenzi, Wesam
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 89 - 96
  • [49] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [50] Access Control of Cloud Service Based on UCON
    Chen Danwei
    Huang Xiuli
    Ren Xunyi
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 559 - 564