Packet: a privacy-aware access control policy composition method for services composition in cloud environments

被引:0
|
作者
Li Lin
Jian Hu
Jianbiao Zhang
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Key Laboratory of Trusted Computing,undefined
[3] National Engineering Laboratory for Classified Information Security Protection,undefined
来源
关键词
cloud service composition; access control; privacy; policy composition; unified policy format; conflict detection; similarity analysis; conflict resolution;
D O I
暂无
中图分类号
学科分类号
摘要
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there’s a conflict among different cloud service providers’ access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection efficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.
引用
收藏
页码:1142 / 1157
页数:15
相关论文
共 50 条
  • [31] Privacy-aware access control with trust management in web service
    Li, Min
    Sun, Xiaoxun
    Wang, Hua
    Zhang, Yanchun
    Zhang, Ji
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2011, 14 (04): : 407 - 430
  • [32] A privacy-aware access control model for distributed network monitoring
    Papagiannakopoulou, Eugenia I.
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2263 - 2281
  • [33] An aspect-oriented approach to privacy-aware access control
    Chen, Kung
    Wang, Da-Wei
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3016 - +
  • [34] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Said Oulmakhzoune
    Nora Cuppens-Boulahia
    Frédéric Cuppens
    Stéphane Morucci
    Mahmoud Barhamgi
    Djamal Benslimane
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 3 - 19
  • [35] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [36] Privacy-aware access control with trust management in web service
    Min Li
    Xiaoxun Sun
    Hua Wang
    Yanchun Zhang
    Ji Zhang
    [J]. World Wide Web, 2011, 14 : 407 - 430
  • [37] Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments
    Lin H.-Y.
    [J]. IEEE Systems Journal, 2019, 13 (02) : 1608 - 1617
  • [38] PRECISE: Privacy-Aware Recommender Based on Context Information for Cloud Service Environments
    Huertas Celdran, Alberto
    Gil Perez, Manuel
    Garcia Clemente, Felix J.
    Martinez Perez, Gregorio
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (08) : 90 - 96
  • [39] Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud Environments
    Lin, Han-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1608 - 1617
  • [40] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    [J]. Journal of Electronic Science and Technology, 2013, (02) : 176 - 180