Abstract
Currently, collaboration is a major challenge in adopting cloud Infrastructure-as-a-Service (IaaS). Enterprise work-flow intrinsically mandates collaboration across its tenant boundaries as well as with associated organizations’ tenants in the cloud. In this paper, we investigate a Circle-of-Trust approach where tenants establish trust within a circle of tenants for the purpose of collaboration. We present a novel extension of role-centric access control models to provide collaboration in the context of homogeneous and heterogeneous circles. In a homogeneous circle, our approach allows tenants to equally assert cross-tenant user assignments to enable access to shared resources. In a circle with non-uniform tenants, attributes are added to distinguish user-assignments where tenants are differentiated by type in the heterogeneous circle. Particularly, tenant-trust relation is established within a group of tenants authorizing user-role assignments across tenants.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
- Circle-of-Trust
- Federation
- Attribute-based access control
- Collaboration
- Multi-tenant
- Authorization
- Security
1 Introduction
Cloud IaaS is firmly accepted by enterprises for its cost benefits, reliability, and dynamicity at scale [12]. Its benefits are well documented and well practiced in the industry, but still organizations resist to fully migrate to cloud IaaS which arises from security, performance, and vendor lock-in concerns. Enabling collaboration mitigates such concerns regarding vendor lock-in and different security levels required, and improves performance by utilizing distinct cloud providers.
In multi-tenant platforms which utilize shared physical infrastructure, users’ data are isolated into tenants to protect privacy and integrity. A tenant could be an organization, a department of an organization, or an individual cloud consumer, which is represented by an account in AWS [1] or a domain in OpenStack [2]. Furthermore, current cloud service providers offer federation APIs to enable collaboration between tenants such as AWS and OpenStack platforms. Besides federation between two tenants, collaboration can also be established between a set of organizations where tenants adhere to a common set of policies, trust relations and collaboration interfaces within a circle. We denote this collaboration model as a Circle-of-Trust. Scenarios such as a large enterprise with multiple tenants collaborating in a public cloud, an organization with tenants across public and private clouds, or tenants from multiple organizations performing collaborative tasks are motivating use cases for Circle-of-Trust.
In this paper we present novel role-based and role-centric attribute-based access control models to enable federation in a multi-tenant cloud IaaS Circle-of-Trust. Our scope of contribution is homogeneous and heterogeneous multi-tenant circles in cloud IaaS.
To better clarify the concept, consider the example in Fig. 1 where ACME, a multinational technology corporation, aims to implement its enterprise requirements with cloud services. ACME migrates its IT infrastructure to a public cloud service provider where each tenant represents a department. ACME utilizes multiple tenants to satisfy distinct security levels required for each department. For example, Finance Dept. resources should not co-locate in the same tenant with Research & Development Dept., as Finance Dept. retains sensitive data. Furthermore, ACME organizational structure demands collaboration between its departments which is thereby required in its cloud adoption. To this end, ACME establishes a Circle-of-Trust among its tenants in the cloud and starts adding its tenants to the circle. For instance a new tenant created as Sales tenant in ACME, requests to join the circle. Adding additional tenants requires all ACME circle members to agree on trusting the new Sales tenant. When Sales tenant joins the circle, it trusts members assertions and its assertions are likewise trusted by other ACME circle members. In particular, Circle-of-Trust offers an association of ACME principals to collaborate in the circle.
Role-based access control (RBAC) [5, 16] and its variations has been successfully applied to cloud IaaS providing collaboration within single-cloud [17, 18] and multi-cloud systems [13]. In RBAC access permissions are assigned to roles and roles are assigned to users. Roles are central to RBAC for formulating policy and its commercial success, where it abstracts permissions into roles and role relations. With its dominance for the past two decades, RBAC limitations have been recognized leading to a push towards using attributes [6, 7, 15] with roles [9]. One method, is to add attributes to roles as role-centric attributes which takes advantage of roles’ simplicity and attributes flexibility [8]. Attributes are defined as name:value pairs representing entities’ properties. We anticipate cloud service providers will incorporate ABAC features to their current RBAC models such as role-centric to adopt convenience of RBAC with flexibility of ABAC models.
Our contribution in this paper is to design multi-tenant role-centric models with cross-tenant user-assignments. To our knowledge this is the first work considering role-centric models in Circle-of-Trust context.
The remainder of this paper is organized as follows. Section 2 overviews trust properties applicable in Circle-of-Trust and corresponding trust relations between tenants. In Sect. 3, our multi-tenant role-based access control in circle denoted MT-RBAC\(_c\) is proposed and specified. Section 4 introduces our multi-tenant role-centric attribute-based model in circle denoted MT-RABAC\(_c\). Related work and conclusion is presented in Sects. 5 and 6 respectively.
2 Concept of Trust in Circle
In a Circle-of-Trust, trust relationships are defined between all circle entities. We use terms entities and principals interchangeably. Principals make assertions in the circle, assigning users to roles.
2.1 Trust Properties in Circle
Trust in the circle has the following properties, entity coupling, initiation, direction, and transitivity. Figure 2 gives a logical hierarchy of these trust properties discussed below. Vertical placement of characteristics is selected to better illustrate trust relations in our scope of contribution.
Entity Coupling (Homogeneous vs. Heterogeneous). In a circle-of trust, type of entities engaging in interactions determines homogeneity or heterogeneity of the circle, shaping its authorized interactions between tenants. Moreover, with each circle type a set of trust properties are applicable. By homogeneous circle we denote the case where entities are uniform. For instance a circle of universities forms a homogeneous circle. In a homogeneous circle, collaborating principals are equally authorized to make cross-tenant authorization assertions. A heterogeneous circle, is an association of non-uniform entities where each type of entity is authorized specifically to make certain assertions. For instance, a circle consisting of universities, insurance companies, and banks establishes a heterogeneous circle. In this scenario, universities can assign users to discounted insurance plans in insurance companies while insurance companies cannot assign their users to resources in the universities. In this paper, we use type and domain interchangeably denoting the type of entities in a heterogeneous circle.
Initiation (Multilateral vs. Unilateral). If trust initiation to join a circle is required to be confirmed by all circle members, trust is considered multilateral. In special situations when joining members are not authorized to make assertions (in heterogeneous circles) trust initiation is not required to be confirmed by all circle members denoted as unilateral trust. For instance a domain of insurance companies joins a heterogeneous, unilateral circle of institutions. Insurance entities in the circle are not authorized to make assertions whilst institution entities are authorized to assert their users to discounted plans available to universities.
Direction (Bidirectional vs. Unidirectional). In a circle, direction of trust determines whether both participating circle members have equal authorizations or only one side is authorized to make assertions. If partners are authorized equally to make assertions, trust relation is bidirectional, otherwise it is unidirectional trust. Homogeneous circles’ relations are bidirectional while heterogeneous circles support both trust directions. Unilateral heterogeneous circles such as given example above are only unidirectional in trust relations. Circle of universities is an example of bidirectional trust in a homogeneous circle. Sharing files in Dropbox is an example of a unidirectional trust where a user can share files with a group of users unidirectionally.
Transitivity (Transitive vs. Non-transitive). In a trust relation when principal “A trusts B” and “B trusts C” result in implication that “A trusts C”, trust relation is denoted as transitive. In a homogeneous circle, bidirectional trusts are essentially transitive where all members trust and likewise trusted by other circle members. In heterogeneous unidirectional circles, trust relations cannot be transitive. For example, in the heterogeneous unidirectional circle of institutions, banks, and insurance companies, an institution can assign students to bank specific account types in banks whilst banks can assign employees to health insurances in insurance companies. Considering heterogeneous domains in the circle, a university trusting a bank and a bank trusting an insurance entity does not necessarily imply that the university can assign students to insurance resources.
In this paper, we consider multilateral, bidirectional, and transitive trust relationships for homogeneous circles. Trust relations between tenants in heterogeneous circles are considered multilateral, unidirectional, and non-transitive. In the following we identify how trust relations authorize cross-tenant assignments in a Circle-of-Trust federation model.
2.2 Tenant-Trust in Circle
In a circle, trust is defined between tenants as tenant-trust relationship. In a unidirectional trust relationship, common in peer-to-peer, trust is initiated and established between two tenants denoted as trustor and trustee. In a trust relation, trustor tenant is willing to trust another tenant denoted as trustee tenant. In our scope, trust is initiated multilaterally between principals in a circle. In the context of circle, trustor and trustee are not distinguished in trust relations between tenants. We identify tenants involve in a cross-tenant assignment as user-owner and resource-owner tenants. User-owner tenant owns the users in the cross-tenant assignment and resource-owner tenant owns the roles to which users are assigned. Central to tenant-trust defined in this paper, is authorizing user-owner or resource-owner tenants to assert cross-tenant user-role assignments.
We use “\( \triangleleft \)” to represent tenant-trust where \(T_A \triangleleft T_B\) signifies that tenant A trusts tenant B. In this relation, \(T_A\) is user-owner tenant and \(T_B\) is resource-owner tenant. Regardless of circle entity coupling, we define two types of tenant trust relations denoted as type-\(\epsilon \) and type-\(\zeta \). Each tenant-trust relation type is applied to all tenants in the circle. In type-\(\epsilon \) circle, user-owner tenants are authorized to assign users to roles in the circle. The following defines type-\(\epsilon \) tenant-trust illustrated in Fig. 3a.
Definition 1
If \(T_A \triangleleft _{\epsilon } T_B\), then tenant \(T_A\) is authorized to assign its users to \(T_B\)’s roles. Tenant \(T_A\) controls user assignments.
In type-\(\zeta \) circle, resource-owner tenants are authorized to assign users in the circle to their roles. Type-\(\zeta \) is defined as follows and is depicted in Fig. 3b.
Definition 2
If \(T_A \triangleleft _{\zeta } T_B\), then tenant \(T_B\) is authorized to assign \(T_A\)’s users to its roles. Tenant \(T_B\) controls user assignments.
In homogeneous circles, all peers trust each other and trust is transitive, therefore \(T_A \triangleleft T_B\) if and only if \(T_B \triangleleft T_A\). However, in heterogeneous circles trust relations are unidirectional and non-transitive as a result \(T_A \triangleleft T_B\) may not imply \(T_B \triangleleft T_A\) or vise versa. Each tenant-trust type caters to a different security concern and objective in the Circle-of-Trust collaboration. Type-\(\epsilon \) enable tenants in the circle to assign their users to roles of other tenants in the circle. The advantage is its simplicity to administer and implement as long as tenants’ resources shared are not sensitive within the circle and tenants are willing to delegate user-role assignments to trusted tenants in the circle. For instance, an academic Circle-of-Trust is a motivation of this type of circle where academic tenants establish a Circle-of-Trust to share computing resources. Any academic tenant can assign its users to resources across tenants in the circle.
Type-\(\zeta \) on the other hand, follows a different purpose to protect shared resources where user-role assignments are administered by resource-owner tenants. Tenants do not want to delegate trusted tenants permission to make assertions to their shared resources. A circle of financial institutions is a motivating example of type-\(\zeta \) tenant-trust. Financial institutes do not want to expose their resources for collaboration in the circle since their resources are highly sensitive even with respect to trusted tenants in the circle. In this scenario, a resource-owner tenant administrator assigns users in the circle to its roles, authorizing access to its shared resources.
3 Homogeneous Role-Based Circle-of-Trust
This section introduces a multi-tenant role-based access control model to enable federation in a homogeneous Circle-of-Trust which we refer to as MT-RBAC\(_c\). In a homogeneous circle, tenants are equally authorized to make assertions. Collaboration in MT-RBAC\(_c\) is issued through cross-tenant user-role assignments with respect to circle types \(\epsilon \) and \(\zeta \). MT-RBAC\(_c\) model component sets and relations are depicted in Fig. 4. We use a circle of institutions called Cyber Security Research (CSR) shown in Fig. 5 as a running example to exemplify the concepts throughout this section. The formal definition of MT-RBAC\(_c\) is given in Table 1. We discuss MT-RBAC\(_c\) in parts through the following subsections, in context of these figures and table.
3.1 MT-RBAC\(_c\) Basic Sets and Functions
The basic sets of MT-RBAC\(_c\) are as follows: tenants (T), users (U), private roles (\(R_{prv}\)), public roles (\(R_{pub}\)), roles (R), operations (OPS), objects (OBS), and permissions (PRMS). Many of these are familiar from the traditional RBAC models [5, 16] and will not be further discussed here. The new sets in MT-RBAC\(_c\) are tenants (T) and private and public roles (\(R_{prv}\) and \(R_{pub}\) respectively).
A tenant is considered as a virtual container with tenant-specific environment for cloud services leased to cloud consumers. Practically, a tenant hosts a project, a department, or an organization. Each tenant is represented as \(t \in T\) where T is the global set of tenants in the cloud. In Fig. 5, each tenant represents an institution, UTSA, UTA, and UTD respectively. Each user, role, and object is identified with a single owner tenant, shown within the dashed tenant boundary in Fig. 5. UTSA and UTD have similar Researcher roles, however in the cloud they are distinguished as Researcher#UTSA and Researcher#UTA. Similarly for objects and users.
Within each tenant the roles are partitioned into disjoint sets of public roles and private roles, \(R_{pub}\) and \(R_{prv}\) respectively, as depicted in Fig. 4 and expressed in Table 1 by the owner functions. In Fig. 5 private roles are shown as blue circles named in italics while public roles are shown as red circles named in regular script, e.g., the UTSA tenant has private roles Professor, Researcher and Research Staff and a public role Scholar.
A central principle of MT-RBAC\(_c\) is that permission to role assignment can only occur within a tenant boundary, and only to private roles. This is formalized in the definition of the permission assignment (PA) relation in Table 1. It is our first departure from traditional RBAC which in general allows any permission to be assigned to any role.
3.2 MT-RBAC\(_c\) Tenant-Trust and User-Role Assignment
A Circle-of-Trust (CoT) is a subset of tenants T who mutually trust each other within the scope of MT-RBAC\(_c\). In Fig. 5, UTSA, UTA, and UTD form a homogeneous CoT of institutes. In general, multiple and possibly overlapping CoTs can be established among different subsets of tenants. For our purpose in this paper it suffices to focus on a single CoT. Tenant-trust between two members of a circle is indicated by the \(\triangleleft \) symbol, which is a reflexive, transitive and symmetric relation.
MT-RBAC\(_c\) distinguishes two kinds of trust, named type-\(\epsilon \) and type-\(\zeta \) and distinguished by a subscript applied to the symbols CoT and \(\triangleleft \). In type-\(\epsilon \) trust each tenant in the \(CoT_\epsilon \) can assign users from another tenant in the circle to its own public roles. In type-\(\zeta \) trust each tenant in the \(CoT_\zeta \) can assign it own users to public roles belonging to another tenant in the circle. In Fig. 5, if CSR is a type-\(\epsilon \) circle then the tenant administrator of UTA can assign its users, e.g., David and May, to roles in UTSA and UTD. If CSR is a type-\(\zeta \) circle then the tenant administrator of UTA can assign users from UTSA, e.g., Alice and John, as well as users from UTD to roles in UTA. In both types of circles such cross-tenant user-role assignments is limited to public roles. These concepts are formalized in Table 1. These restrictions on user-role assignment constitute a second major departure from traditional RBAC.
3.3 Limited Role Hierarchy
A third significant departure from traditional RBAC is to limit the role hierarchy with respect to public and private roles. We use the symbol \(\succeq \) to represent the role hierarchy where \(r_1\succeq r_2\) means that the permissions assigned to role \(r_2\) are also available to users assigned to role \(r_1\). MT-RBAC\(_c\) imposes the following requirements on the role hierarchy.
-
Private roles can inherit private roles only if both are owned by the same tenant, e.g., Senior Researcher \(\succeq \) Researcher in the UTD tenant in Fig. 5.
-
Private roles cannot inherit public roles. The Researcher role in UTD tenant cannot be senior to the Scholar role in UTSA.
-
Public roles can inherit private roles only if both owned by the same tenant. In the UTD tenant, Security Scientist role inherits the Researcher role.
-
Public roles can inherit public roles from trusted tenants in the circle. In UTD tenant, Senior Scientist \(\succeq \) Security Scientist where both are UTD’s public roles. It is also possible for a public role of one tenant to be senior to a public role in another tenant. We include this possibility for generality, although role to role assignment is outside the scope of MT-RBAC\(_c\).
3.4 MT-RBAC\(_c\) Trust Properties
In terms of the circle trust properties of Sect. 2.1 MT-RBAC\(_c\) is homogeneous in entity coupling since all tenants in the circle are treated equivalently. In term of initiation in joining or leaving a circle of trust, MT-RBAC\(_c\) does not explicitly formalize this aspect. As such MT-RBAC\(_c\) is neutral on this issue. Different models of initiation such a multilateral or unilateral are compatible with MT-RBAC\(_c\). Regarding direction and transitivity, a circle in MT-RBAC\(_c\) is explicitly defined to be bidirectional and transitive.
4 Heterogeneous Role-and-Attribute Based Circle-of-Trust
This section, introduces a multi-tenant role-centric attribute-based access control model (MT-RABAC\(_c\)) enabling federation in a heterogeneous Circle-of-Trust. Our model is motivated by a previously defined role-centric model [8] for combining roles and attributes. In a heterogeneous circle, entities are from non-uniform types. In MT-RABAC\(_c\), tenants are not equally authorized and cross-tenant user-role assignments are limited with respect to tenant’s domain type attribute.
MT-RABAC\(_c\) adds attributes to enforce cross-tenant user-role assignment separation. Attributes are used to denote tenant types where tenants are only authorized to assert cross-tenant user assignments on certains type of tenants. Figure 6 depicts elements in MT-RABAC\(_c\), where tenant attributes (TATT), user attributes (UATT), and object attributes (OATT) are added to the tenant, user, and object components of Fig. 4 respectively. We use a heterogeneous circle of institutions (UTA and UTSA) and a bank (BoA) in Fig. 7 as a running example to exemplify the concepts throughout this section. The extensions and modifications to the MT-RBAC\(_c\) model to obtain MT-RABAC\(_c\) are formally given in Table 2. Similar to the description of MT-RBAC\(_c\) in the previous section, we will describe MT-RABAC\(_c\) systematically in the following subsections, in context of the afore-mentioned figures and table.
4.1 MT-RABAC\(_c\) User and Object Attributes and Meta-Attributes
An attribute is considered as a function which takes a tenant, user or object as input and return a value from the attribute’s range. For example, an atomic-valued user attribute function such as employeeType returns employee status of a user john where \(employeeType \in UATT\), \(john \in U\) and employeeType(john) = \(full\_time\). Range or scope of an attribute is a finite set of atomic values specifying the valid range of attribute functions. Attribute functions either return a single value or set of values, which are respectively called atomic-valued and set-valued attribute types. In MT-RABAC\(_c\), users and objects are respectively associated with attributes in the sets UATT and OATT. Each user attribute \(uatt\in UATT\) is a partial function since not every attribute is defined for every user. Similarly, each object attribute \(oatt\in OATT\) is a partial function.
Each user and object attribute is owned by a single tenant. This is realized by means of meta-attributes uattOwner and oattOwner. Users and objects can only be assigned attribute values for attributes owned by the same tenant as the user or object. User and object attributes do not impact user-role assignment and are included in the model for generality and uniformity.
4.2 MT-RABAC\(_c\) Tenant Attributes
Tenant attributes are fundamental to MT-RABAC\(_c\) to enforce constraints on cross-tenant user-role assignments. Each tenant administrator can only assign values to its set of tenant attributes. In a heterogeneous circle, tenants are from different types which needs to be recognized in cross-tenant user-role assignments. To that end, we define a domain as a set of tenants grouped together with respect to their type in the system. Each domain is a subset of T defined in Table 2. For instance in Fig. 7, circle includes two types of tenants, Institute and Bank domains. Particularly, a tenant is related to a domain with an atomic-valued required attribute function, tenantDomain. It is defined as an atomic attribute to signify that each tenant only belongs to one domain. In Fig. 7, UTSA and UTA have Institute and BoA has Bank tenantDomain attribute values. Moreover, to separate user-role assignments in MT-RABAC\(_c\), trustedDomains is defined as a required set-valued tenant attribute. In MT-RABAC\(_c\), each tenant administrator specifies the group of domains it trusts with their assertions, including its own domain. For instance in Fig. 7, UTSA trusts assertions from Institute and Bank domain while UTA only trusts Bank domain assertions meaning UTA does not trust assertions from its own domain. In the heterogeneous circle in Fig. 7, BoA does not allow any assertions from tenants in the circle.
4.3 MT-RABAC\(_c\) Tenant-Trust
In MT-RABAC\(_c\), tenant-trust is limited with trustedDomains attributes. In type-\(\epsilon \) circle, user-owner tenant can assign its users to roles from tenants which it is a member of their trustedDomains attribute set. In type-\(\zeta \), user assignment is modified to satisfy the condition where role-owner tenant can assign users from tenants in the circle, if it is a member of their trustedDomains attribute set. Type \(\epsilon \) and \(\zeta \) is defined in Table 2. In Fig. 7, if circle is a type-\(\epsilon \), then the tenant administrator of UTA can assign its users, e.g., David and May, to roles in UTSA since UTSA trusts assertions from its domain. If circle is a type-\(\zeta \), then the tenant administrator of BoA can assign users from UTSA, e.g., Alice and John, as well as users from UTA to roles in BoA since both UTSA an UTA trust assertions from Bank domain tenants.
In this context, user-assignment is modified with respect to trustedDomains attributes. A user is assigned to a role only if

In a Circle-of-Trust we allow only one trust type in the circle. We don’t allow both type \(\epsilon \) and \(\zeta \) at once in a circle due to assignment conflict. Permission-assignment remains unchanged where a permission is assigned to a role only if

Authorized_user_permisisons denotes the set of permissions available to a user with respect to tenant types in the circle which is not changed from Table 1.
4.4 MT-RABAC\(_c\) Trust Properties
In terms of the circle trust properties of Sect. 2.1 MT-RABAC\(_c\) is heterogeneous in entity coupling since tenants in the circle are distinguished by their domain, and thereby not treated equivalently. In term of initiation in joining or leaving a circle of trust, MT-RABAC\(_c\) does not explicitly formalize this aspect. As such MT-RABAC\(_c\) is neutral on this issue. Different models of initiation such a multilateral or unilateral are compatible with MT-RBAC\(_c\). Regarding direction and transitivity, a circle in MT-RBAC\(_c\) is explicitly defined to be unidirectional and non-transitive.
5 Related Work
The Liberty Alliance Project [20] identified the conceptual framework and guidelines in a Circle-of-Trust as part of their federated identity vision. Considerable research on Circle-of-Trust has been devoted to identity federation such as [10] where trust requirements and patterns in a Circle-of-Trust identity federation are identified. In [3], Circle-of-Trust collaboration trust considerations in identity federation for assessment of entities’ trust outside the circle are considered. Our work is focussed on authorization federation in a collaboration group of entities considered as tenants.
Sharing resources among organizations has been investigated in multiple aspects. ROBAC [21] extended RBAC to consider authorization in multiple organizations, but collaboration within organizations is not considered. GB-RBAC [11] extends RBAC with groups to support collaboration. In GB-RBAC, administrator cannot manage users in the groups. In our model, each tenant administers its collaboration policy by controlling users or roles in user-role assignments across the tenants in the circle. In [19], a dynamic coalition-based access control (DCBAC) model is proposed that allows automatic access to resources of one coalition entity by users from another coalition entity. O2O [4] defined an approach to deal with access control in interoperability context based on virtual private organizations (VPO) and role single-sign on (RSSO). Our contribution is differentiated based on the collaboration framework to enable collaboration between tenants. In O2O, each organization is responsible to define its security policy for roles whereas in our federation framework, each tenant defines its collaboration policy through public roles for a group of tenants in the circle.
Further in cloud IaaS, models such as CTTM [17] extended RBAC to enable collaboration in multi-tenant cloud systems. In [13], cross-tenant collaboration models discussed enabling federation in multi-cloud environments. In this paper, we focus on Circle-of-Trust federation compared to [17] and [13] where collaboration is enabled in a Peer-to-Peer federation. In ABAC collaboration in cloud, MT-ABAC [14] proposed collaboration between tenants by cross-tenant attribute assignment in cloud IaaS. Such attribute-based federation provides Peer-to-Peer collaboration, however our role-centric model provides federation in a circle.
6 Conclusion
This paper elaborated a fine-grained collaboration model in a Circle-of-Trust. We introduced the MT-RBAC\(_c\) model in a homogeneous circle, in which collaboration is enabled through user to public role assignments. We identified, private and public roles with limited role hierarchy to control access on tenants’ resources. Trust is defined on tenants with circle types \(\epsilon \) and \(\zeta \) authorizing user-owner and resource-owner tenants’ assertions respectively. Moreover, tenant attributes in MT-RABAC\(_c\) classifies tenants into domains in heterogeneous circles, where tenant-trust is defined conditionally with trustedDomain attributes. Using roles and attributes to enable cross-tenant user-role assignments is general and dynamic enough to address current issues while it is applicable to current platforms. For future work, we plan to extend this work with attribute-based models into further generalization in multi-cloud environments and implement proposed models in the current cloud platforms such as OpenStack.
References
Amazon AWS. https://aws.amazon.com/
OpenStack. http://www.openstack.org/
Boursas, L., Danciu, V.A.: Dynamic inter-organizational cooperation setup in circle-of-trust environments. In: Network Operations and Management Symposium, NOMS 2008, pp. 113–120. IEEE (2008)
Cuppens, F., Cuppens-Boulahia, N., Coma, C.: O2O: virtual private organizations to manage security policy interoperability. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 101–115. Springer, Heidelberg (2006)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. TISSEC 4(3), 224–274 (2001)
Hu, V.C., Ferraiolo, D., et al.: Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication, 800:162 (2014)
Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. Computer 2, 85–88 (2015)
Jin, X., Sandhu, R., Krishnan, R.: RABAC: role-centric attribute-based access control. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 84–96. Springer, Heidelberg (2012)
Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 6, 79–81 (2010)
Kylau, U., Thomas, I., Menzel, M., Meinel, C.: Trust requirements in identity federation topologies. In: International Conference on Advanced Information Networking and Applications, AINA 2009, pp. 137–145. IEEE (2009)
Li, Q., Zhang, X., Xu, M., Wu, J.: Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5), 260–275 (2009)
Mell, P., Grance, T.: The NIST definition of cloud computing (2011)
Pustchi, N., Krishnan, R., Sandhu, R.: Authorization federation in IaaS multi cloud. In: Proceedings of Security in Cloud Computing, pp. 63–71. ACM (2015)
Pustchi, N., Sandhu, R.: MT-ABAC: a multi-tenant attribute-based access control model with tenant trust. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) NSS 2015. LNCS, vol. 9408, pp. 206–220. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25645-0_14
Sandhu, R.: The authorization leap from rights to attributes: maturation or chaos? In: Proceedings of SACMAT, pp. 69–70. ACM (2012)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
Tang, B., Sandhu, R.: Cross-tenant trust models in cloud computing. In: Proceedings of International Conference on IRI, pp. 129–136. IEEE (2013)
Tang, B., Sandhu, R., Li, Q.: Multi-tenancy authorization models for collaborative cloud services. In: Proceedings of CTS, pp. 132–138. IEEE (2013)
Warner, J., Atluri, V., Mukkamala, R.: A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 252–266. Springer, Heidelberg (2005)
Wason, T., Cantor, S., Hodges, J., Kemp, J., Thompson, P.: Liberty ID-FF Architecture Overview. Liberty Alliance, Piscataway (2004)
Zhang, Z., Zhang, X., Sandhu, R.: ROBAC: scalable role and organization based access control models. In: Proceedings of CollaborateCom, pp. 1–9. IEEE (2006)
Acknowledgement
This research is partially supported by NSF Grant CNS-1111925 and CNS-1423481.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pustchi, N., Sandhu, R. (2016). Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS. In: Ranise, S., Swarup, V. (eds) Data and Applications Security and Privacy XXX. DBSec 2016. Lecture Notes in Computer Science(), vol 9766. Springer, Cham. https://doi.org/10.1007/978-3-319-41483-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-41483-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41482-9
Online ISBN: 978-3-319-41483-6
eBook Packages: Computer ScienceComputer Science (R0)