A Multi-Tenant RBAC Model for Collaborative Cloud Services

被引:0
作者
Tang, Bo [1 ]
Li, Qi [1 ]
Sandhu, Ravi [1 ]
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
来源
2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) | 2013年
关键词
cloud computing; multi-tenancy; trust; collaboration; fine-grained authorization; GRAINED ACCESS-CONTROL; MANAGEMENT; AUTHORIZATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. In this setting, a tenant temporarily uses a piece of virtually dedicated software, platform, or infrastructure. To fully benefit from the cloud, tenants are seeking to build controlled and secure collaboration with each other. In this paper, we propose a Multi-Tenant Role-Based Access Control (MT-RBAC) model family which aims to provide fine-grained authorization in collaborative cloud environments by building trust relations among tenants. With an established trust relation in MT-RBAC, the trustee can precisely authorize cross-tenant accesses to the truster's resources consistent with constraints over the trust relation and other components designated by the truster. The users in the trustee may restrictively inherit permissions from the truster so that multi-tenant collaboration is securely enabled. Using SUN's XACML library, we prototype MT-RBAC models on a novel Authorization as a Service (AaaS) platform with the Joyent commercial cloud system. The performance and scalability metrics are evaluated with respect to an open source cloud storage system. The results show that our prototype incurs only 0.016 second authorization delay for end users on average and is scalable in cloud environments.
引用
收藏
页码:229 / 238
页数:10
相关论文
共 36 条
  • [1] Alam M., 2011, Proceedings of the 16th ACM Symposium on Access Control Models and Technologies ACM SACMAT, P31
  • [2] From gridmap-file to VOMS: managing authorization in a Grid environment
    Alfieri, R
    Cecchini, R
    Ciaschini, V
    dell'Agnello, L
    Frohner, A
    Lorentey, K
    Spataro, E
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (04): : 549 - 558
  • [3] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    [J]. IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [4] [Anonymous], HLTH CARE NOT YET RE
  • [5] [Anonymous], CORE HIERARCHICAL RO
  • [6] [Anonymous], IEEE INT C COLL TECH
  • [7] [Anonymous], TAKING ADVANTAGE MUL
  • [8] [Anonymous], SPECIAL PUBLICATION
  • [9] Bauer L, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P43, DOI 10.1145/1542207.1542216
  • [10] Bertino E, 2004, INT WKSHP FUT TR DIS, P59