A Novel Role-based Access Control Model in Cloud Environments

被引:28
作者
Luo, Jun [1 ]
Wang, Hongjun [2 ]
Gong, Xun [3 ]
Li, Tianrui [2 ]
机构
[1] Sichuan Univ, Coll Math, Inst Informat Secur, Chengdu 610054, Peoples R China
[2] Southwest Jiaotong Univ, Key Lab Cloud Comp & Intelligent Technol, Chengdu 610031, Peoples R China
[3] Sichuan Univ, Southwest Jiaotong Univ, Chengdu Neusoft Univ, Coll Comp Sci,Key Lab Cloud Comp & Intelligent Te, Chengdu 610054, Peoples R China
关键词
Access control; Cloud; Security; Availability; Trust; Bayesian; RBAC MODEL;
D O I
10.1080/18756891.2016.1144149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments. When using the RBAC model in Cloud environments, some new elements should be considered. This paper proposes a SAT-RBAC model (security and availability based trust relationship in RBAC) and adopts the following elements as the main factors of a trust relationship: the security state and network availability of the host used by a user, the protection state of the service providers that are related to the role. A security-based scheduling model for Cloud environments is presented. Because of the uncertainty of Cloud environments, the trust relationship is divided into three zones: the unbelievable zone, the probable believable zone and the believable zone. Bayesian method is used to estimate the trust probability distribution in the probable believable zone. This paper also provides algorithms to evaluate the values of the main elements of a trust relationship. Finally, the experiments in simulated Cloud environment based on CloudSim in PlanetLab are discussed and the results prove that the SAT-RBAC model is effective in filtering abnormal behaviors in Cloud environments.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 21 条
[1]  
[Anonymous], P 2014 INT C INF COM
[2]   RBAC Extension Model for ERP Systems in Multidomain Environments [J].
Baryolo, O. G. ;
Senti, V. E. ;
Cortes, M. L. ;
Rodriguez, I. G. .
IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (05) :2185-2190
[3]  
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[4]  
Chen L., 2008, P 2008 ACM S INF COM, P20
[5]  
Choi JH, 2010, J INF SCI ENG, V26, P1801
[6]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[7]   Cloudsim: simulator for cloud computing infrastructure and modeling [J].
Goyal, Tarun ;
Singh, Ajit ;
Agrawal, Aakanksha .
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 :3566-3572
[8]  
Griffiths TL, 2008, CAMB HANDB PSYCHOL, P59
[9]  
Jang EY, 2010, INFORMATION-TOKYO, V13, P1653
[10]   Privacy-Preserving Enforcement of Spatially Aware RBAC [J].
Kirkpatrick, Michael S. ;
Ghinita, Gabriel ;
Bertino, Elisa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (05) :627-640