Packet: a privacy-aware access control policy composition method for services composition in cloud environments

被引:0
|
作者
Li Lin
Jian Hu
Jianbiao Zhang
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Key Laboratory of Trusted Computing,undefined
[3] National Engineering Laboratory for Classified Information Security Protection,undefined
来源
关键词
cloud service composition; access control; privacy; policy composition; unified policy format; conflict detection; similarity analysis; conflict resolution;
D O I
暂无
中图分类号
学科分类号
摘要
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there’s a conflict among different cloud service providers’ access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection efficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.
引用
收藏
页码:1142 / 1157
页数:15
相关论文
共 50 条
  • [21] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [22] Conditional privacy-aware role based access control
    Ni, Qun
    Lin, Dan
    Bertino, Elisa
    Lobo, Jorge
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 72 - +
  • [23] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [24] The architecture of a privacy-aware access control decision component
    Ardagna, Claudio A.
    Cremonini, Marco
    Damiani, Ernesto
    De Capitani di Vimercati, Sabrina
    Samarati, Pierangela
    CONSTRUCTION AND ANALYSIS OF SAFE, SECURE, AND INTEROPERABLE SMART DEVICES, 2006, 3956 : 1 - 15
  • [25] Scalable Access Control For Privacy-Aware Media Sharing
    Ma, Changsha
    Yan, Zhisheng
    Chen, Chang Wen
    IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (01) : 173 - 183
  • [26] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD
    Mon, Ei Ei
    Naing, Thinn Thu
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451
  • [27] Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services
    Pervez, Zeeshan
    Ahmad, Mahmood
    Khattak, Asad Masood
    Lee, Sungyoung
    Chung, Tae Choong
    PLOS ONE, 2016, 11 (08):
  • [28] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [29] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815
  • [30] Privacy-Aware Cloud-based Input Method Editor
    Kawamoto, Junpei
    Sakurai, Kouichi
    2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 209 - 213