An Attribute-Role Based Access Control Mechanism for Multi-tenancy Cloud Environment

被引:11
作者
Lo, Nai Wei [2 ]
Yang, Ta Chih [2 ]
Guo, Ming Huang [1 ]
机构
[1] Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
Multi-tenancy; Cloud computing; Role-based access control; Authorization; Attribute;
D O I
10.1007/s11277-015-2515-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Because of the rapid development of software technology, many enterprises require more high-performance hardware to enhance their competitiveness. Cloud computing is the result of distributed computing, grid computing and is gradually being seen as the future solution to the companies. Cloud computing can virtualize existing software and hardware to reduce costs. Thus, enterprises only require high Internet bandwidth and devices to access cloud service on the Internet. This would decrease many overhead costs and reduce IT staff requirement. A cloud environment provider provides many companies to rent a cloud service simultaneously in the provider's cloud, the technology is named multi-tenancy cloud service. However, how to access resource safely is an important topic if user want to adopt multi-tenancy cloud computing technology. The cloud-computing environment is vulnerable to network-related attacks. This research uses role-based access control authorization mechanism concept and combines it with attribute based access control to determine which tenant that user can access. The enhanced authorization mechanism can improve the safety of cloud computing services and protected the data secret.
引用
收藏
页码:2119 / 2134
页数:16
相关论文
共 29 条
[1]  
Alipour H., 2011, INT C INT TECHN SEC
[2]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[3]  
Alshehri S., 2013, 2013 IEE INT C HEALT
[4]  
[Anonymous], 2006, Multi-tenant data architecture
[5]  
[Anonymous], IEEE INT C WEB SERV
[6]  
[Anonymous], J INNOVATION MANAGEM
[7]  
Carles M. G., 2011, INFORM PROCESSING LE
[8]   Real-Time Data Delivery Using Prediction Mechanism in Mobile Environments [J].
Chiang, Ding-Jung ;
Wang, Ching-Sheng ;
Chen, Chien-Liang ;
Deng, Der-Jiunn .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (04) :1345-1362
[9]   An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments [J].
Chu, Hai-Cheng ;
Deng, Der-Jiunn ;
Chao, Han-Chieh .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) :5-19
[10]  
Chu HC, 2009, J UNIVERS COMPUT SCI, V15, P2373