An Access Control Model for Cloud Computing Environments

被引:1
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Trust;
D O I
10.1109/ADCONS.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [21] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [22] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [23] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242
  • [24] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [25] A composite document model and its access control scheme in cloud computing
    Ma, J., 1600, Xi'an Jiaotong University (48):
  • [26] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [27] Structured Document Model and Its Secure Access Control in Cloud Computing
    Xiong, Jinbo
    Yao, Zhiqiang
    Ma, Jun
    Liu, Ximeng
    Li, Qi
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 592 - 596
  • [28] Toward a New Extension of the Access Control Model ABAC for Cloud Computing
    Ed-Daibouni, Maryam
    Lebbat, Adil
    Tallal, Saida
    Medromi, Hicham
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 79 - 89
  • [29] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [30] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +