Access Control Management for Cloud

被引:9
|
作者
Habiba, Mansura [1 ]
Islam, Md. Rafiqul [1 ]
Ali, A. B. M. Shawkat [2 ]
机构
[1] Amer Int Univ Bangladesh, Dept Comp Sci, Dhaka, Bangladesh
[2] i LaB Australia, Rockhampton, Qld 4701, Australia
关键词
Cloud computing; access control; authorization; audit;
D O I
10.1109/TrustCom.2013.61
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Managing data access control in an authorized and authenticated way is still one of the key challenge in cloud security. In a complex environment like cloud, data owner and Cloud Service Provider (CSP) need to monitor continuously who is accessing which data in order to prevent unauthorized access. Moreover, it should be pre-defined that who can perform which operation on particular data, which can reduce unauthorized access to a great extent. In this regard, user's access to any data, application and services reside in cloud should be controlled, managed dynamically and monitored continuously. Most of cases the traditional system is not efficient enough to cope up with dynamic cloud environment, due to high dynamicity, data virtualization and multi-tenancy, higher scalability and higher degree of integrity. Existing systems also merely provide efficient auditing and reporting functionality regarding access control management. In this research we have designed a data intensive dynamic access control model for cloud environment. Several authorization algorithms are devised in this paper. Our proposed access control model has portrayed the system framework and different module along with their functionalities. Multi Agent based System (MAS) is represented to define the accessibility and functionality of the proposed model. Moreover, an enhanced authorization scheme is driven in this work to improve the security of the proposed system. We have also represented security and efficiency analysis of proposed models which has shown that our proposed scheme is efficient and secured enough to deals with the access control management.
引用
收藏
页码:485 / 492
页数:8
相关论文
共 50 条
  • [1] A Secure Access Control Framework for Cloud Management
    Zhang, Jiawei
    Lu, Ning
    Ma, Jianfeng
    Wang, Ruixiao
    Shi, Wenbo
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 404 - 416
  • [2] A Secure Access Control Framework for Cloud Management
    Jiawei Zhang
    Ning Lu
    Jianfeng Ma
    Ruixiao Wang
    Wenbo Shi
    Mobile Networks and Applications, 2022, 27 : 404 - 416
  • [3] Access Control Management of the Cloud Service Platform
    Chung, Ki-Sook
    Keum, Changsup
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 621 - 625
  • [4] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):
  • [5] Network-level Access Control Management for the Cloud
    Beaty, Kirk
    Kundu, Ashish
    Naik, Vijay
    Acharya, Arup
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 98 - 107
  • [6] Efficient Identity Management and Access Control in Cloud Environment
    Gloster, Jonathan
    CYBER SENSING 2013, 2013, 8757
  • [7] Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud
    Kumar, Naveen
    Mathuria, Anish
    Das, Manik Lal
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 36 - 44
  • [8] Access control management for e-Healthcare in cloud environment
    Sun, Lili
    Yong, Jianming
    Soar, Jeffrey
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2014, 1 (02) : 1 - 11
  • [9] User Centric Access Control Policy Management Framework for Cloud Applications
    Ghafoor, Abdul
    Irum, Misbah
    Qaisar, Muhammad
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 135 - 140
  • [10] A Taxonomy of Cloud Attack Consequences and Mitigation Strategies The Role of Access Control and Privileged Access Management
    Tep, Kin Suntana
    Martini, Ben
    Hunt, Ray
    Choo, Kim-Kwang Raymond
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1073 - 1080