A Sequence-Based Access Control Framework for Reliable Security Management in Clouds

被引:0
作者
Moghaddam, Faraz Fatemi [1 ,2 ]
Emadinia, Tayyebe [2 ]
Wieder, Philipp [1 ]
Yahyapour, Ramin [1 ,2 ]
机构
[1] Gesell Wissensch Datenverarbeitung mbH Gottingen, Gottingen, Germany
[2] Georg August Univ, Inst Informat, Gottingen, Germany
来源
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018) | 2018年
关键词
Cloud Computing; Security; Access Control; Sequence; Policy Management; Token; OF-THE-ART; POLICY MANAGEMENT; CONTROL MODEL; CHALLENGES; OPPORTUNITIES; ISSUES;
D O I
10.1109/FiCloud.2018.00023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be protected from disclosing to unauthorized users. Policy-Management models are the most appropriate solutions to create and manage security levels in clouds. However, these models increase the process of matching access requests to defined policies considerably. In this paper, we proposed a reliable access management framework based on multi-level policies and sequences. The suggested model introduces each level of security as s sequence according to the inheritance concepts to classify security levels efficiently and to enhance the process of access control by elimination of unnecessary re-matching. our results showed the suggested model is able to decrease the access response time without affecting the security of the environments.
引用
收藏
页码:108 / 113
页数:6
相关论文
共 21 条
[1]  
[Anonymous], 2015, INT J MULTIMED UBIQU, DOI DOI 10.14257/IJMUE.2015.10.4.32
[2]   Cloud Computing Networking: Challenges and Opportunities for Innovations [J].
Azodolmolky, Siamak ;
Wieder, Philipp ;
Yahyapour, Ramin .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (07) :54-62
[3]   State of the art and challenges of security SLA for cloud computing [J].
Batista de Carvalho, Carlos Andre ;
de Castro Andrade, Rossana Maria ;
de Castro, Miguel Franklin ;
Coutinho, Emanuel Ferreira ;
Agoulmine, Nazim .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :141-152
[4]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[5]   Ontology-based access control model for security policy reasoning in cloud computing [J].
Choi, Chang ;
Choi, Junho ;
Kim, Pankoo .
JOURNAL OF SUPERCOMPUTING, 2014, 67 (03) :711-722
[6]  
Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
[7]  
de Chaves Shirlei Aparecida, 2010, 2010 Sixth International Conference on Networking and Services (ICNS), P212, DOI 10.1109/ICNS.2010.36
[8]  
Gupta R., 2015, IMPROVED SUBSTITUTIO, P197
[9]  
Khosla R, 2012, IEEE CONF COMPUT, P1, DOI 10.1109/INFCOMW.2012.6193491
[10]   DNA-based cryptographic methods for data hiding in DNA media [J].
Marwan, Samiha ;
Shawish, Ahmed ;
Nagaty, Khaled .
BIOSYSTEMS, 2016, 150 :110-118