Packet: a privacy-aware access control policy composition method for services composition in cloud environments

被引:9
作者
Lin, Li [1 ,2 ,3 ]
Hu, Jian [1 ,2 ]
Zhang, Jianbiao [1 ,2 ,3 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[2] Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
[3] Natl Engn Lab Classified Informat Secur Protect, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud service composition; access control; privacy; policy composition; unified policy format; conflict detection; similarity analysis; conflict resolution;
D O I
10.1007/s11704-016-5503-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection efficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.
引用
收藏
页码:1142 / 1157
页数:16
相关论文
共 21 条
[1]  
Ahn G J, 2012, P IEEE C COMP SOFTW, P137
[2]  
[Anonymous], J SOFTWARE TOOLS TEC
[3]  
[Anonymous], 2007, P 16 INT C WORLD WID
[4]  
Begum B A, 2010, P IEEE INT C COMP CO, P1
[5]  
Bonatti P., 2002, ACM Transactions on Information and Systems Security, V5, P1, DOI 10.1145/504909.504910
[6]   A Framework for Controlling and Managing Hybrid Cloud Service Integration [J].
Breiter, Gerd ;
Naik, Vijay K. .
PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, :217-224
[7]  
Bryans Jery., 2005, Proceedings of the 2005 Workshop on Secure Web Services, P28
[8]  
Enamul K., 2009, AUSTR DAT C, P135
[9]  
Fan Beibei., 2011, 2011 International Conference on Computational and Information Sciences, P377
[10]  
Fisler K, 2005, PROC INT CONF SOFTW, P196