An Access Control Model for Cloud Computing Environments

被引:1
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
来源
2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013) | 2013年
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Trust;
D O I
10.1109/ADCONS.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 16 条
  • [1] Bertolissi C, 2008, CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, P1, DOI 10.1109/CRISIS.2008.4757458
  • [2] Birget JC, 2001, 2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, P229, DOI 10.1109/ICC.2001.936308
  • [3] Analysis and Design of an Access Control Model Based on Credibility
    Chang Chaowen
    Wang Yuqiao
    Liu Chen
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 312 - +
  • [4] Demchenko Yuri, 2006, P 2 IEEE INT C E SCI
  • [5] A Trust and Context Based Access Control Model for Distributed Systems
    Feng, Fujun
    Lin, Chuang
    Peng, Dongsheng
    Li, Junshan
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +
  • [6] Gunjan Kumar, 2012, INT J ENG RES TECHNO, V1
  • [7] Krawczyk Henryk, 2010, P 2 INT C INF TECHN, P121
  • [8] Lang Bo, 2007, P 2 INT C PERV COMP
  • [9] Lingli Zhao, 2010, 2010 2nd Conference on Environmental Science and Information Application Technology (ESIAT 2010), P548, DOI 10.1109/ESIAT.2010.5568874
  • [10] Pereira A. L., 2011, 2011 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, P914, DOI 10.1109/IPDPS.2011.237