An Access Control Model for Cloud Computing Environments

被引:1
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Trust;
D O I
10.1109/ADCONS.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [31] An adaptive distributed access control model for IoT and fog computing environments
    Charaf, Lalla Amina
    Alihamidi, Imam
    Deroussi, Anass
    Madi, Abdessalam Ait
    Addaim, Adnane
    Charaf, Moulay El Hassan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2024, 44 (03) : 230 - 245
  • [32] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [33] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [34] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [35] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [36] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [37] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [38] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [39] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [40] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80