Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition

被引:21
作者
Amini, Morteza [1 ]
Osanloo, Farnaz [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran 1136511155, Iran
关键词
Cloud computing; software as a service; service composition; access control; privacy preserving; CLOUD; MECHANISM;
D O I
10.1109/TSC.2016.2616875
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two main security issues in software as a service (SaaS) delivery model of cloud environments are access control and privacy preserving in basic web services as well as composite services where we require to infer policies through the automatic composition of the policies specified for their constituting basic services. In this paper, we present a privacy preserving access control model and framework for secure service provision and composition. The model is a combination of an attribute based access control model and a proposed purpose-based privacy model. Following this model, an access request for a service is permitted if the requester's attribute certificates and contextual conditions are in compliance with the access control policies specified by the service provider and simultaneously the privacy preferences of the requester is compatible with the privacy policies of the service provider. In the framework proposed in this paper, for secure service composition, possible chains of composite services are ranked according to the users' preferences and sensitivity level of their data. The security policies of the composite service, established by the chosen chain of services, are inferred by automatic composition of policies specified for the basic services in the chain.
引用
收藏
页码:604 / 620
页数:17
相关论文
共 43 条
  • [21] Privacy on the web: Facts, challenges, and solutions
    Rezgui, Abdelmounaam
    Bouguettaya, Athman
    Eltoweissy, Mohamed Y.
    [J]. 2003, Institute of Electrical and Electronics Engineers Inc. (01) : 40 - 49
  • [22] Ruj S., 2012, Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), P556, DOI 10.1109/CCGrid.2012.92
  • [23] Security Policy Composition for Composite Web Services
    Satoh, Fumiko
    Tokuda, Takehiro
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (04) : 314 - 327
  • [24] Secure Composition of Cascaded Web Services
    Shafiq, Basit
    Chun, Soon
    Vaidya, Jaideep
    Badar, Nazia
    Adam, Nabil
    [J]. PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 137 - 146
  • [25] Shaikh F. B., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P214
  • [26] Security-Aware Service Composition with Fine-Grained Information Flow Control
    She, Wei
    Yen, I-Ling
    Thuraisingham, Bhavani
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (03) : 330 - 343
  • [27] Shen HB, 2006, SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, P74
  • [28] Shey H., 2009, STATE ENTERPRISE SOF
  • [29] Shih-Chien Chou, 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS 2010), P54
  • [30] An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
    Smari, Waleed W.
    Clemente, Patrice
    Lalande, Jean-Francois
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 31 : 147 - 168