Achieving security-by-design through ontology-driven attribute-based access control in cloud environments

被引:17
|
作者
Veloudis, Simeon [1 ]
Paraskakis, Iraklis [1 ]
Petsos, Christos [1 ]
Verginadis, Yannis [2 ]
Patiniotakis, Ioannis [2 ]
Gouvas, Panagiotis [3 ]
Mentzas, Gregoris [2 ]
机构
[1] Univ Sheffield Int Fac, CITY Coll, SEERC, Thessaloniki, Greece
[2] Natl Tech Univ Athens, Inst Commun & Comp Syst, Athens, Greece
[3] Ubitech, Athens, Greece
基金
欧盟地平线“2020”;
关键词
Context-aware security; Ontologies; Access control policies; Data privacy; Security-by-design; Semantic reasoning;
D O I
10.1016/j.future.2018.08.042
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The constantly increasing number of cyberattacks worldwide raise significant security concerns that generally deter small, medium and large enterprises from adopting the cloud paradigm and benefitting from the numerous advantages that it offers. One way to alleviate these concerns is to devise suitable policies that infuse adequate access controls into cloud services. However, the dynamicity inherent in cloud environments, coupled with the heterogeneous nature of cloud services, hinders the formulation of effective and interoperable access control policies that are suitable for the underlying domain of application. To this end, this work proposes an approach to the semantic representation of access control policies and, in particular, to the semantic representation of the context expressions incorporated in such policies. More specifically, the proposed approach enables stakeholders to accurately define the structure of their policies, in terms of relevant knowledge artefacts, and thus infuse into these policies their particular security and business requirements. This clearly leads to more effective policies, whilst it enables semantic reasoning about the abidance of policies by the prescribed structure. In order to alleviate the scalability concerns associated with semantic reasoning, the proposed approach introduces a reference implementation that extends XACML 3.0 with an expert system fused with reasoning capabilities through the incorporation of suitable meta-rules. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:373 / 391
页数:19
相关论文
共 50 条
  • [1] A survey on attribute-based encryption schemes of access control in cloud environments
    Hwang, M.-S. (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [2] A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing
    BenMarak, Omessead
    Naanaa, Anis
    Elasmi, Sadok
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 415 - 425
  • [3] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [4] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [5] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [6] Dynamic Attribute-Based Access Control in Cloud Storage Systems
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Chunkai
    Zhao, Xiaomeng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 129 - 137
  • [7] Attribute-based bilateral access control scheme for cloud storage
    Li Q.
    Fan H.
    Chen W.
    Xiong J.
    Han L.
    Li R.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136
  • [8] Attribute-Based Access Control for Vehicular Edge Cloud Computing
    Cheng, Cheng-Yu
    Liu, Hang
    Hsieh, Li-Tse
    Colbert, Edward
    Cho, Jin-Hee
    2020 IEEE CLOUD SUMMIT, 2020, : 18 - 24
  • [9] Securing Home IoT Environments with Attribute-Based Access Control
    Bezawada, Bruhadeshwar
    Haefner, Kyle
    Ray, Indrakshi
    PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 43 - 53
  • [10] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)