An Access Control Model for Cloud Computing Environments

被引:1
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Trust;
D O I
10.1109/ADCONS.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [1] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [2] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [3] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [4] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [5] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [6] A credible usage access control model in cloud computing
    Wang, Fengying
    Li, Caihong
    Zhao, Hui
    Liu, Shushu
    Information Technology Journal, 2013, 12 (20) : 5553 - 5558
  • [7] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [8] An assurance model for access control on cloud computing systems
    Li Y.
    Zhao Y.
    Guo X.
    Liu G.
    1600, Tsinghua University (57): : 432 - 436
  • [9] A Classified Access Control Model Research for Cloud Computing
    Shen, Wenyi
    Tao, Linbo
    Liu, Bo
    Wang, Yishen
    PROCEEDINGS OF 2017 CHINESE INTELLIGENT AUTOMATION CONFERENCE, 2018, 458 : 327 - 334
  • [10] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345