Achieving security-by-design through ontology-driven attribute-based access control in cloud environments

被引:17
|
作者
Veloudis, Simeon [1 ]
Paraskakis, Iraklis [1 ]
Petsos, Christos [1 ]
Verginadis, Yannis [2 ]
Patiniotakis, Ioannis [2 ]
Gouvas, Panagiotis [3 ]
Mentzas, Gregoris [2 ]
机构
[1] Univ Sheffield Int Fac, CITY Coll, SEERC, Thessaloniki, Greece
[2] Natl Tech Univ Athens, Inst Commun & Comp Syst, Athens, Greece
[3] Ubitech, Athens, Greece
基金
欧盟地平线“2020”;
关键词
Context-aware security; Ontologies; Access control policies; Data privacy; Security-by-design; Semantic reasoning;
D O I
10.1016/j.future.2018.08.042
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The constantly increasing number of cyberattacks worldwide raise significant security concerns that generally deter small, medium and large enterprises from adopting the cloud paradigm and benefitting from the numerous advantages that it offers. One way to alleviate these concerns is to devise suitable policies that infuse adequate access controls into cloud services. However, the dynamicity inherent in cloud environments, coupled with the heterogeneous nature of cloud services, hinders the formulation of effective and interoperable access control policies that are suitable for the underlying domain of application. To this end, this work proposes an approach to the semantic representation of access control policies and, in particular, to the semantic representation of the context expressions incorporated in such policies. More specifically, the proposed approach enables stakeholders to accurately define the structure of their policies, in terms of relevant knowledge artefacts, and thus infuse into these policies their particular security and business requirements. This clearly leads to more effective policies, whilst it enables semantic reasoning about the abidance of policies by the prescribed structure. In order to alleviate the scalability concerns associated with semantic reasoning, the proposed approach introduces a reference implementation that extends XACML 3.0 with an expert system fused with reasoning capabilities through the incorporation of suitable meta-rules. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:373 / 391
页数:19
相关论文
共 50 条
  • [21] Attribute-based fuzzy identity access control in multicloud computing environments
    Wenmin Li
    Qiaoyan Wen
    Xuelei Li
    Debiao He
    Soft Computing, 2018, 22 : 4071 - 4082
  • [22] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [23] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [24] Achieving Mobile-Health Privacy Using Attribute-Based Access Control
    Pagadala, Vignesh
    Ray, Indrakshi
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 301 - 316
  • [25] Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search
    Saraswathy, K. S.
    Sujatha, S. S.
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (07) : 569 - 575
  • [26] Cryptanalysis of Attribute-Based Data Sharing Scheme for data access security in Cloud Computing
    Hu, Aoting
    Jiang, Rui
    Wu, Songyang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 307 - 310
  • [27] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2017, 15 (01) : 90 - 98
  • [28] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [29] Auditable attribute-based data access control using blockchain in cloud storage
    V. Ezhil Arasi
    K. Indra Gandhi
    K. Kulothungan
    The Journal of Supercomputing, 2022, 78 : 10772 - 10798
  • [30] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)