Ontology-based access control model for security policy reasoning in cloud computing

被引:62
作者
Choi, Chang [1 ]
Choi, Junho [1 ]
Kim, Pankoo [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Kwangju, South Korea
关键词
Access control model; Cloud computing; Ontology reasoning; Semantic analysis model;
D O I
10.1007/s11227-013-0980-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are many security issues in cloud computing service environments, including virtualization, distributed big-data processing, serviceability, traffic management, application security, access control, authentication, and cryptography, among others. In particular, data access using various resources requires an authentication and access control model for integrated management and control in cloud computing environments. Cloud computing services are differentiated according to security policies because of differences in the permitted access right between service providers and users. RBAC (Role-based access control) and C-RBAC (Context-aware RBAC) models do not suggest effective and practical solutions for managers and users based on dynamic access control methods, suggesting a need for a new model of dynamic access control that can address the limitations of cloud computing characteristics. This paper proposes Onto-ACM (ontology-based access control model), a semantic analysis model that can address the difference in the permitted access control between service providers and users. The proposed model is a model of intelligent context-aware access for proactively applying the access level of resource access based on ontology reasoning and semantic analysis method.
引用
收藏
页码:711 / 722
页数:12
相关论文
共 24 条
[1]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[2]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[3]   Designing Host and Network Sensors to Mitigate the Insider Threat [J].
Bowen, Brian M. ;
Ben Salem, Malek ;
Hershkop, Shlomo ;
Keromytis, Angelos D. ;
Stolfo, Salvatore J. .
IEEE SECURITY & PRIVACY, 2009, 7 (06) :22-29
[4]  
Cappelli D., 2006, Common sense guide to prevention and detection of insider threats [PDF document]
[5]  
Choi C., 2012, J Internet Serv Inf Secur, V2, P54
[6]  
Corradi A., 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC 2004, P444, DOI 10.1109/CMPSAC.2004.1342877
[7]  
Fakushima K., 2011, J INTERNET SERVICES, V1, P4
[8]  
Ferraiolo DF, 2003, ARTECH H COMP SEC LI
[9]  
Finin T, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P73
[10]  
Han WL, 2005, Fifth International Conference on Computer and Information Technology - Proceedings, P757