POLICY LANGUAGE FOR ACCESS CONTROL IN SOCIAL NETWORK CLOUD

被引:2
|
作者
Morovat, Katanosh [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Access control; cloud computing; policy language; social network; well-formed format;
D O I
10.1109/SmartCloud.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past several decades, the number of people using online social networks for public relations or sharing documents have increased significantly. This worldwide use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition, to protect these resources, access control policies have been devised. This research provides a model to protect shared data from unauthorized access. This model enforces finer-grained access control in a social network, and enables users to define policies to govern belonging resources and to input inquiries in order to access a resource in the most effective way. Policies and inquiries are converted to an easy-to-use format, which enhances the time and efficiency of evaluation of inputs. In this paper, we propose a well-formed notation for specifying a cloud-based social network and the associated access control policies. We show that our notation enables users to define policies in a simpler and more efficient way and that it helps users to protect their assets under a tight security. The main contribution of this work is that resource owners are able to protect their resources from unauthorized access in an easy and efficient way, and requestors are able to feed their access requests in a simple, clear, and effortless way as well.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 50 条
  • [11] Towards an access control policy language for CORBA
    Brose, G
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 279 - 279
  • [12] A certified access control policy language: TEpla
    Amir Eaman
    Amy Felty
    Innovations in Systems and Software Engineering, 2024, 20 : 49 - 64
  • [13] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    Journal of Electronic Science and Technology, 2013, (02) : 176 - 180
  • [14] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    Journal of Electronic Science and Technology, 2013, 11 (02) : 176 - 180
  • [15] Decentralized access control with policy updating in cloud manufacturing
    Li L.
    Gu T.
    Chang L.
    Li J.
    Qian J.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2280 - 2290
  • [16] Social Network Analysis for Efficient Cloud Data Access
    Himaja, N.
    Murali, G.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 368 - 371
  • [17] Access and Mobility Policy Control at the Network Edge
    Pencheva, Evelina
    Atanasov, Ivaylo
    Asenov, Ivaylo
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (03): : 105 - 111
  • [18] Policy Description Language for Dynamic Access Control Models
    Hashimoto, Masaki
    Kim, Mira
    Tsuji, Hidenori
    Tanaka, Hidehiko
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 37 - 42
  • [19] Access Control Policy Specification Language Based on Metamodel
    Luo Y.
    Shen Q.-N.
    Wu Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (02): : 439 - 454
  • [20] CSchema: A Downgrading Policy Language for XML Access Control
    Dong-Xi Liu
    Journal of Computer Science and Technology, 2007, 22 : 44 - 53