Dynamic Access Control Model for Cloud Computing

被引:0
|
作者
Auxilia, M. [1 ]
Raja, K. [2 ]
机构
[1] Sathyabama Univ, Madras, Tamil Nadu, India
[2] Alpha Coll Engn, Madras, Tamil Nadu, India
关键词
Access Control; Cloud Computing; Context; Ontology; Security Issues; Semantics;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud Computing paradigm motivates researchers from both industry and academia with lot of research issues. Right from small and medium sized businesses and large scale businesses and even a single individual start utilizing cloud for their demands in terms of storage, software as well as infrastructure elastically and pay on use basis. But this transition to the cloud poses many security issues. One predominant issue is data security breach at many levels. Traditional cryptographic techniques and access control models like Mandatory, Discretionary and Role Based Access Control models are illsuited for addressing multifarious security breaches in the cloud. This paper proposes dynamic access control for securing data in the cloud. This approach considers the interrelationship between the requestor, data being requested and action to be performed on that data. We also consider the context of the user for granting access control dynamically. In this paper, we enlighten the framework, its components and furthermore present an initial implementation of our model and some of the results of the same.
引用
收藏
页码:47 / 56
页数:10
相关论文
共 50 条
  • [1] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [2] A Dynamic Multi-domain Access Control Model in Cloud Computing
    Xiong, Dapeng
    Zou, Peng
    Cai, Jun
    He, Jun
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 3 - 12
  • [3] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [4] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [5] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [6] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [7] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [8] A credible usage access control model in cloud computing
    Wang, Fengying
    Li, Caihong
    Zhao, Hui
    Liu, Shushu
    Information Technology Journal, 2013, 12 (20) : 5553 - 5558
  • [9] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [10] An assurance model for access control on cloud computing systems
    Li Y.
    Zhao Y.
    Guo X.
    Liu G.
    1600, Tsinghua University (57): : 432 - 436