Towards an Approach of Semantic Access Control for Cloud Computing

被引:0
作者
Hu, Luokai [1 ]
Ying, Shi [1 ]
Jia, Xiangyang [1 ]
Zhao, Kai [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan 430072, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
Semantic Web; Access Control; SACPL; ACOOS; Cloud Computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
引用
收藏
页码:145 / 156
页数:12
相关论文
共 20 条
  • [1] Bell David E., 1976, Secure Computer System: Unified Exposition and Multics Interpretation, DOI 10.21236/ADA023588
  • [2] BELL DE, 1973, MTR2547 MITRE CORP, V1
  • [3] Meta-policies for distributed role-based access control systems
    Belokosztolszki, A
    Moody, K
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 106 - 115
  • [4] The Semantic Web - A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities
    Berners-Lee, T
    Hendler, J
    Lassila, O
    [J]. SCIENTIFIC AMERICAN, 2001, 284 (05) : 34 - +
  • [5] Biba K.J., 1977, INTEGRITY CONSIDERAT
  • [6] De Vimercati S. D. C., 2000, P INT SCH FOUND SEC, P137, DOI DOI 10.1007/3-540-45608-23
  • [7] Denning D., 1982, Cryptography and Data Security
  • [8] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [9] Hadap S, 2000, SPRING COMP SCI, P87
  • [10] PROTECTION IN OPERATING-SYSTEMS
    HARRISON, MA
    RUZZO, WL
    ULLMAN, JD
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (08) : 461 - 470