ABACaaS: Attribute-Based Access Control as a Service

被引:6
|
作者
Meshram, Augustee [1 ]
Das, Saptarshi [1 ]
Sural, Shamik [1 ]
Vaidya, Jaideep [2 ]
Atluri, Vijayalakshmi [2 ]
机构
[1] IIT Kharagpur, Kharagpur, W Bengal, India
[2] Rutgers State Univ, New Brunswick, NJ USA
来源
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19) | 2019年
关键词
Attribute-Based Access Control; Cloud service; Red Hat OpenShift;
D O I
10.1145/3292006.3302381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Attribute-Based Access Control (ABAC) has emerged as the desired access control model in scenarios involving sharing of resources across multiple domains. This necessitates organizations using traditional access control models to use ABAC. However, ab initio deployment of ABAC is both cost and time intensive. In this paper, we present ABACaaS - a cloud service that enables any organization to integrate ABAC into their own environment irrespective of the platform they operate in. We show both SaaS as well as PaaS instances of ABACaaS along with results on its performance.
引用
收藏
页码:153 / 155
页数:3
相关论文
共 50 条
  • [1] Attribute-Based Access Control in Service Mesh
    Ponomarev, Kirill Yu.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [2] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [3] BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service
    Kumar, Ritik
    Palanisamy, Balaji
    Sural, Shamik
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,
  • [4] Efficient Blockchain Enabled Attribute-based Access Control as a Service
    Kumar, Ritik
    Palanisamy, Balaji
    Sural, Shamik
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 87 - 96
  • [5] Adopting Attribute-Based Access Control to Data Distribution Service
    Murugesan, Priya
    Chinnappa, Swanima
    Alaerjan, Alaa
    Kim, Dae-Kyoo
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 112 - 115
  • [6] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [7] Attribute-Based Access Control for web service with requester's attribute privacy protected
    Wu, Kaixing
    Gao, Hongyun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 932 - 936
  • [8] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [9] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    JournalofElectronicScienceandTechnology, 2017, 15 (01) : 90 - 98
  • [10] A Web Service Architecture for Decentralised Identity- and Attribute-based Access Control
    Hebig, Regina N.
    Meinel, Christoph
    Menzel, Michael
    Thomas, Ivonne
    Warschofsky, Robert
    2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 551 - 558