Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition

被引:21
作者
Amini, Morteza [1 ]
Osanloo, Farnaz [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran 1136511155, Iran
关键词
Cloud computing; software as a service; service composition; access control; privacy preserving; CLOUD; MECHANISM;
D O I
10.1109/TSC.2016.2616875
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two main security issues in software as a service (SaaS) delivery model of cloud environments are access control and privacy preserving in basic web services as well as composite services where we require to infer policies through the automatic composition of the policies specified for their constituting basic services. In this paper, we present a privacy preserving access control model and framework for secure service provision and composition. The model is a combination of an attribute based access control model and a proposed purpose-based privacy model. Following this model, an access request for a service is permitted if the requester's attribute certificates and contextual conditions are in compliance with the access control policies specified by the service provider and simultaneously the privacy preferences of the requester is compatible with the privacy policies of the service provider. In the framework proposed in this paper, for secure service composition, possible chains of composite services are ranked according to the users' preferences and sensitivity level of their data. The security policies of the composite service, established by the chosen chain of services, are inferred by automatic composition of policies specified for the basic services in the chain.
引用
收藏
页码:604 / 620
页数:17
相关论文
共 43 条
  • [11] Jiang HQ, 2012, PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, P684, DOI 10.1109/ICCT.2012.6511292
  • [12] Cloud computing service composition: A systematic literature review
    Jula, Amin
    Sundararajan, Elankovan
    Othman, Zalinda
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (08) : 3809 - 3824
  • [13] Supporting negotiation mechanism privacy authority method in cloud computing
    Ke, Changbo
    Huang, Zhiqiu
    Tang, Mei
    [J]. KNOWLEDGE-BASED SYSTEMS, 2013, 51 : 48 - 59
  • [14] Khan A.R., 2012, Access control in cloud computing environment, V7, P613
  • [15] Lee A. J., 2006, P 4 ACM WORKSH FORM, P45
  • [16] Minimal privacy authorization in web services collaboration
    Liu, Linyuan
    Zhu, Haibin
    Huang, Zhiqiu
    Xie, Dongqing
    [J]. COMPUTER STANDARDS & INTERFACES, 2011, 33 (03) : 332 - 343
  • [17] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [18] Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
    Pervaiz, Zahid
    Aref, Walid G.
    Ghafoor, Arif
    Prabhu, Nagabhushana
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) : 795 - 807
  • [19] The platform for privacy preferences
    Reagle, J
    Cranor, LF
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (02) : 48 - 55
  • [20] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384