Packet: a privacy-aware access control policy composition method for services composition in cloud environments

被引:0
|
作者
Li Lin
Jian Hu
Jianbiao Zhang
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Key Laboratory of Trusted Computing,undefined
[3] National Engineering Laboratory for Classified Information Security Protection,undefined
来源
关键词
cloud service composition; access control; privacy; policy composition; unified policy format; conflict detection; similarity analysis; conflict resolution;
D O I
暂无
中图分类号
学科分类号
摘要
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there’s a conflict among different cloud service providers’ access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection efficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.
引用
收藏
页码:1142 / 1157
页数:15
相关论文
共 50 条
  • [1] Packet:a privacy-aware access control policy composition method for services composition in cloud environments
    Li LIN
    Jian HU
    Jianbiao ZHANG
    [J]. Frontiers of Computer Science., 2016, 10 (06) - 1157
  • [2] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Lin, Li
    Hu, Jian
    Zhang, Jianbiao
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (06) : 1142 - 1157
  • [3] Privacy-aware Cloud Services Composition
    Ghafour, Samer Abdul
    Ghodous, Parisa
    Bonnet, Christine
    [J]. 2015 IEEE 24TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2015, : 140 - 142
  • [4] PRIVACY POLICY COMPOSITION OF PRIVACY-AWARE RBAC MODEL FOR COMPOSITE WEB SERVICES
    Yan, Danfeng
    Tian, Yuan
    [J]. 2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 312 - 316
  • [5] Privacy-aware Web Services Selection and Composition
    Li, Tianyang
    He, Ting
    [J]. PROCEEDINGS 2014 INTERNATIONAL CONFERENCE ON SERVICE SCIENCES (ICSS 2014), 2014, : 147 - 151
  • [6] PRIVACY-AWARE DATA PROVIDING WEB SERVICES COMPOSITION
    Cherbal, Amin
    Benslimane, Djamal
    [J]. ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 167 - +
  • [7] PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments
    Lin, Li
    Liu, Ting-Ting
    Li, Shuang
    Magurawalage, Chathura M. Sarathchandra
    Tu, Shan-Shan
    [J]. IEEE ACCESS, 2018, 6 : 1882 - 1893
  • [8] An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services
    Xiong, Ling
    Li, Fagen
    He, Mingxing
    Liu, Zhicai
    Peng, Tu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2309 - 2323
  • [9] Privacy-aware multi-tenant access control for cloud workflow
    Wen, Yiping
    Liu, Jianxun
    Dou, Wanchun
    Chen, Aiming
    Zhou, Minhao
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (04): : 894 - 900
  • [10] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397