Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes

被引:0
作者
Greneche, Nicolas [1 ]
Andres, Frederic [2 ]
Tanabe, Shihori [3 ]
Pester, Andreas [4 ]
Ali, Hesham H. [5 ]
Mahmoud, Amgad A. [6 ]
Bascle, Dominique [7 ]
机构
[1] Univ Sorbonne Paris North, LIPN UMR 7030, 99 Ave JB Clement, F-93430 Villetaneuse, France
[2] Natl Inst Informat, Digital Content & Media Sci Res Div, 2-1-2 Hitotsubashi,Chiyoda Ku, Tokyo 1018430, Japan
[3] Natl Inst Hlth Sci, Ctr Biol Safety & Res, Div Risk Assessment, 3-25-26 Tonomachi,Kawasaki Ku, Kawasaki, Kanagawa 2109501, Japan
[4] British Univ Egypt, Fac Informat & Comp Sci, AI Grp, Suez Desert Rd,POB 43, El Sherouk City 11837, Egypt
[5] Univ Nebraska, Coll Informat Sci & Technol, Omaha, NE 68182 USA
[6] British Univ Egypt, Fac Informat & Comp Sci, Artificial Intelligence Dept, Suez Desert Rd, El Sherouk City 11837, Cairo, Egypt
[7] Univ Sorbonne Paris North, DSI UNIF, 99 Ave JB Clement, F-93430 Villetaneuse, France
来源
MACHINE LEARNING FOR NETWORKING, MLN 2023 | 2024年 / 14525卷
关键词
Storage; Data; Security Policies; Access Control; ABAC; PROTECTION;
D O I
10.1007/978-3-031-59933-0_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This position paper presents a method to ease the management of data security from the user point of view. Nowadays, users have many ways to access the same data: direct connection to the host, shared filesystem or web drive-like solutions. This leads to complex data access control policies. At the same time, users have more and more liberty in resource instantiation. They can benefit from various self service storage facilities from many Cloud operators in an on-premise or remote way. Moreover, interfaces with these providers are designed in a way that real locations of data are hidden to give an illusion of infinite resources availability. Obviously, Cloud providers have many ways to fine tune resource allocation but users may not be aware of it. With this growth of resource distribution, access control also evolved. Formerly, a simple access control scheme based on identity was sufficient for data security (IBAC). With the complexity increase of access control, new schemes emerged based on roles (RBAC) or attributes (ABAC). We will investigate the last one because attributes rules access control but it also gives information on a user's profile that may be used to ease the creation and configuration of data services on distributed resources such as Cloud providers.
引用
收藏
页码:199 / 217
页数:19
相关论文
共 38 条
[1]  
[Anonymous], 1998, P 21 NAT INF SYST SE
[2]  
[Anonymous], 1991, INFORM TECHNOLOGY SE
[3]  
[Anonymous], Kubernetes-see
[4]  
BADGER L, 1995, P IEEE S SECUR PRIV, P66, DOI 10.1109/SECPRI.1995.398923
[5]  
Bell D.E., 1973, Technical Report ESD-TR-73-278-1
[6]  
Biba K., 1975, Mitre Report MTR-3153
[7]  
Boebert W.E., 1985, P 8 NAT COMP SEC C
[8]   Enforcing Security and Assurance Properties in Cloud Environment [J].
Bousquet, Aline ;
Briffaut, Jeremy ;
Caron, Eddy ;
Maria Dominguez, Eva ;
Franco, Javier ;
Lefray, Arnaud ;
Lopez, Oscar ;
Ros, Saioa ;
Rouzaud-Cornabas, Jonathan ;
Toinard, Christian ;
Uriarte, Mikel .
2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, :271-280
[9]  
Brand S.L., 1985, Nat. Comput. Secur. Center, P1
[10]  
Briffaut J, 2009, J COMPUT, V4, P395, DOI 10.4304/jcp.4.5.395-404