An Access Control Model for Cloud Computing Environments

被引:1
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Trust;
D O I
10.1109/ADCONS.2013.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [41] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [42] Enhancing Access Control Trees for Cloud Computing
    Ayeb, Neil
    Di Cerbo, Francesco
    Trabelsi, Slim
    CURRENT TRENDS IN WEB ENGINEERING, ICWE 2016 INTERNATIONAL WORKSHOPS, 2016, 9881 : 29 - 38
  • [43] Verifiable computation with access control in cloud computing
    Xu, Lingling
    Tang, Shaohua
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (02): : 528 - 546
  • [44] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
  • [45] Access Control Models for Cloud Computing: A Review
    Shan, Ting Li
    Ismail, Saiful Adli
    Azizan, Azizul
    2018 2ND INTERNATIONAL CONFERENCE ON TELEMATICS AND FUTURE GENERATION NETWORKS (TAFGEN), 2018, : 155 - 158
  • [46] A survey on access control mechanisms for cloud computing
    El Sibai, Rayane
    Gemayel, Nader
    Abdo, Jacques Bou
    Demerjian, Jacques
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [47] Access Control Aware Search on the Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Challal, Zakia
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1258 - 1264
  • [48] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [49] A new trust model in cloud computing environments
    Wu, Xu
    International Journal of Hybrid Information Technology, 2015, 8 (03): : 177 - 184
  • [50] Towards a Secure Access to Patient Data in Cloud Computing Environments
    Aminzou, Said
    Er-Raha, Brahim
    Khamlichi, Youness Idrissi
    Afdel, Karim
    Machkour, Mustapha
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,