Toward role-based provisioning and access control for infrastructure as a service (IaaS)

被引:4
|
作者
Shin, Dongwan [1 ]
Akkan, Hakan [1 ]
Claycomb, William [2 ]
Kim, Kwanjoong [3 ]
机构
[1] New Mexico Inst Min & Technol, Secure Comp Lab, Socorro, NM 87801 USA
[2] Sandia Natl Labs, Albuquerque, NM 87123 USA
[3] Hanseo Univ, Seosansi, South Korea
基金
美国国家科学基金会;
关键词
Cloud computing; IaaS; Domain-based; Decentralized cloud; Role-based access control;
D O I
10.1007/s13174-011-0035-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has drawn much attention in recent years. One of its service models, called infrastructure as a service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques. Most of the current IaaS providers take the user-resource direct mapping approach for their business, where individual users are the only type of service consumer who can request and use virtualized resources as long as they pay for the usage. Therefore, in this approach, the users and virtual resources are centrally managed at the IaaS providers. However, this also results in the lack of support for scalable authorization management of users and resources, organization-level policy support, and flexible pricing for business users. Considering the increasing popularity and growing user base of cloud computing, there is a strong need for a more flexible IaaS model with a finer grained access control mechanism than the aforementioned all-or-nothing approach. In this paper we pro-pose a domain-based, decentralized framework for provisioning and managing users and virtualized resources in IaaS. Specifically, an additional layer called domain is introduced to the user-resource direct mapping scheme, whereby de-centralization of user and resource management is facilitated. Our framework also allows the IaaS service provider to delegate its administrative routines to domains so that each domain is able to manage its users and virtualized resources allocated by the IaaS provider. Our domain-based approach offers benefits such as scalable user/resource management, domain-based security and governance policy support, and flexible pricing.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [1] Service-oriented role-based access control
    Xu, Feng
    Lai, Hai-Guang
    Huang, Hao
    Xie, Li
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2005, 28 (04): : 686 - 693
  • [2] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [3] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [4] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [5] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    [J]. 2001, Association for Computing Machinery (35):
  • [6] A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
    ZHANG Shaomin~ 1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1827 - 1830
  • [7] Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control
    Janardhanan, Janani
    Sharbaf, Mehrdad S.
    [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1315 - 1319
  • [8] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [9] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [10] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88