POLICY LANGUAGE FOR ACCESS CONTROL IN SOCIAL NETWORK CLOUD

被引:2
|
作者
Morovat, Katanosh [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Access control; cloud computing; policy language; social network; well-formed format;
D O I
10.1109/SmartCloud.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past several decades, the number of people using online social networks for public relations or sharing documents have increased significantly. This worldwide use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition, to protect these resources, access control policies have been devised. This research provides a model to protect shared data from unauthorized access. This model enforces finer-grained access control in a social network, and enables users to define policies to govern belonging resources and to input inquiries in order to access a resource in the most effective way. Policies and inquiries are converted to an easy-to-use format, which enhances the time and efficiency of evaluation of inputs. In this paper, we propose a well-formed notation for specifying a cloud-based social network and the associated access control policies. We show that our notation enables users to define policies in a simpler and more efficient way and that it helps users to protect their assets under a tight security. The main contribution of this work is that resource owners are able to protect their resources from unauthorized access in an easy and efficient way, and requestors are able to feed their access requests in a simple, clear, and effortless way as well.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 50 条
  • [31] Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 576 - 583
  • [32] A Trust-aware Access Control Policy for Cloud Data Protection
    Tang, Xiaoyong
    Li, Jinwei
    Liao, Guiping
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 40 - 44
  • [33] Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage
    Jiang, Weiyu
    Wang, Zhan
    Liu, Limin
    Gao, Neng
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 341 - 356
  • [34] Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
    Hiller, Jens
    Kimmerlin, Mael
    Plauth, Max
    Heikkila, Seppo
    Klauck, Stefan
    Lindfors, Ville
    Eberhardt, Felix
    Bursztynowski, Dariusz
    Santos, Jesus Llorente
    Hohlfeld, Oliver
    Wehrle, Klaus
    2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018), 2018, : 241 - 249
  • [35] Role Based Access Control for Social Network Sites
    Li, Jianguo
    Tang, Yong
    Mao, Chengjie
    Lai, Hanjiang
    Zhu, Jun
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 389 - +
  • [36] Intimacy based Access Control for Social Network Sites
    Wang, Yonggang
    Zhai, Ennan
    Lua, Eng Keong
    Hu, Jianbin
    Chen, Zhong
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 517 - 524
  • [37] Social Network Privacy via Evolving Access Control
    Di Crescenzo, Giovanni
    Lipton, Richard J.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 551 - +
  • [38] Access control models for information retrieval in social network
    Zhang, X. (x.zhang@seu.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [39] Usable Global Network Access Policy for Process Control Systems
    Nicol, David M.
    Sanders, William H.
    Singh, Sankalp
    Seri, Mouna
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 30 - 36
  • [40] Network-Level Access Control Policy Analysis and Transformation
    Basile, Cataldo
    Cappadonia, Alberto
    Lioy, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) : 985 - 998