POLICY LANGUAGE FOR ACCESS CONTROL IN SOCIAL NETWORK CLOUD

被引:2
|
作者
Morovat, Katanosh [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Access control; cloud computing; policy language; social network; well-formed format;
D O I
10.1109/SmartCloud.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past several decades, the number of people using online social networks for public relations or sharing documents have increased significantly. This worldwide use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition, to protect these resources, access control policies have been devised. This research provides a model to protect shared data from unauthorized access. This model enforces finer-grained access control in a social network, and enables users to define policies to govern belonging resources and to input inquiries in order to access a resource in the most effective way. Policies and inquiries are converted to an easy-to-use format, which enhances the time and efficiency of evaluation of inputs. In this paper, we propose a well-formed notation for specifying a cloud-based social network and the associated access control policies. We show that our notation enables users to define policies in a simpler and more efficient way and that it helps users to protect their assets under a tight security. The main contribution of this work is that resource owners are able to protect their resources from unauthorized access in an easy and efficient way, and requestors are able to feed their access requests in a simple, clear, and effortless way as well.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 50 条
  • [41] Layered graph logic as an assertion language for access control policy models
    Collinson, Matthew
    McDonald, Kevin
    Pym, David
    JOURNAL OF LOGIC AND COMPUTATION, 2017, 27 (01) : 41 - 80
  • [42] Access Control Policy Extraction from Unconstrained Natural Language Text
    Slankas, John
    Williams, Laurie
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 435 - 440
  • [43] Access Control Policy Misconfiguration Detection in Online Social Networks
    Javed, Yousra
    Shehab, Mohamed
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 544 - 549
  • [44] Network Access Control Towards Fully-controlled Cloud Infrastructure
    Yamada, Takuya
    Takahashi, Keichi
    Muraki, Masaya
    Date, Susumu
    Shimojo, Shinji
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 452 - 455
  • [45] Relationship-based access control: More than a social network access control model
    Lobo, Jorge
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 9 (02)
  • [46] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [47] Trust Based Access Control Policy in Multi-domain of Cloud Computing
    Lin, Guoyuan
    Bie, Yuyu
    Lei, Min
    JOURNAL OF COMPUTERS, 2013, 8 (05) : 1357 - 1365
  • [48] Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    Xie, Ruitao
    Huang, Liusheng
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2013 - 2021
  • [49] Secure Cloud Storage Model with Hidden Policy Attribute based Access Control
    Sowmiya, M.
    Adimoolam, M.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [50] Policy-based spectrum access control for dynamic spectrum access network radios
    Perich, Filip
    McHenry, Mark
    JOURNAL OF WEB SEMANTICS, 2009, 7 (01): : 21 - 27