Access Control Management for Cloud

被引:9
作者
Habiba, Mansura [1 ]
Islam, Md. Rafiqul [1 ]
Ali, A. B. M. Shawkat [2 ]
机构
[1] Amer Int Univ Bangladesh, Dept Comp Sci, Dhaka, Bangladesh
[2] i LaB Australia, Rockhampton, Qld 4701, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Cloud computing; access control; authorization; audit;
D O I
10.1109/TrustCom.2013.61
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Managing data access control in an authorized and authenticated way is still one of the key challenge in cloud security. In a complex environment like cloud, data owner and Cloud Service Provider (CSP) need to monitor continuously who is accessing which data in order to prevent unauthorized access. Moreover, it should be pre-defined that who can perform which operation on particular data, which can reduce unauthorized access to a great extent. In this regard, user's access to any data, application and services reside in cloud should be controlled, managed dynamically and monitored continuously. Most of cases the traditional system is not efficient enough to cope up with dynamic cloud environment, due to high dynamicity, data virtualization and multi-tenancy, higher scalability and higher degree of integrity. Existing systems also merely provide efficient auditing and reporting functionality regarding access control management. In this research we have designed a data intensive dynamic access control model for cloud environment. Several authorization algorithms are devised in this paper. Our proposed access control model has portrayed the system framework and different module along with their functionalities. Multi Agent based System (MAS) is represented to define the accessibility and functionality of the proposed model. Moreover, an enhanced authorization scheme is driven in this work to improve the security of the proposed system. We have also represented security and efficiency analysis of proposed models which has shown that our proposed scheme is efficient and secured enough to deals with the access control management.
引用
收藏
页码:485 / 492
页数:8
相关论文
共 13 条
[1]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[2]  
[Anonymous], INT J ENG RES APPL I
[3]  
[Anonymous], P INT C CLOUD COMP T
[4]  
[Anonymous], KASP LAB IT SEC NEXT
[5]  
[Anonymous], ACCESS CLOUD IDENTIT
[6]  
Chen DW, 2009, LECT NOTES COMPUT SC, V5931, P559, DOI 10.1007/978-3-642-10665-1_52
[7]  
Foster I., 2008, P GRID COMPUTING ENV
[8]  
Gubbi J., 2012, Internet of Things (IoT): A vision, architectural elements, and future directions
[9]  
Popa L., 2010, HOTNETS
[10]  
Rui Xie, 2012, 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), P945, DOI 10.1109/CLOUD.2012.144