Skip to main content

Quantified Attribute Access Control Model for Cloud Storage Platform

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

  • 2652 Accesses

Abstract

Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the granularity of the model elements and the dynamics which leads the security of the resource in cloud computing is limited. In this paper, a quantified attribute-based access control (QABAC) model is proposed. The concept of quantified attribute and trust degree is defined. Three attribute quantization functions are proposed for dynamically calculation, and the security degree of the access will be obtained. Finally the authorization policy determines final permission according to the trust degree. Compared with other traditional models, QABAC is flexible, extensible and dynamic. It will not only protect the security of resource among potential attack from network, but also has the capacity to meet the performance requirement in practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Beak, J., Vu, Q.H., Liu, J.K., et al.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)

    Article  Google Scholar 

  2. Liu, Q.Y., Sha, H.Z., Shi-Ming, L.I., et al.: An access control method based on quantified services and roles in large scale of network visits. Chin. J. Comput. (2014)

    Google Scholar 

  3. Almutairi, A., Sarfraz, M., Basalamah, S., et al.: A distributed access control architecture for cloud computing. IEEE Softw. 29(2), 36–44 (2011)

    Article  Google Scholar 

  4. Xia, Z., Wang, X., Zhang, L., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Tran. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  5. Younis, A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 45–60 (2014)

    Google Scholar 

  6. Yang, K., Liu, Z., Jia, X., et al.: Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans. Multimedia 18(5), 940–950 (2016)

    Article  Google Scholar 

  7. Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for k-barrier coverage based on integer linear programming. Chin. Commun. 13(7), 16–23 (2016)

    Article  Google Scholar 

  8. Simmhan, Y., Kumbhare, A.G., Cao, B., et al.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing, pp. 582–589. IEEE Computer Society (2011)

    Google Scholar 

  9. Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: SACMAT 2006, ACM Symposium on Access Control MODELS and Technologies, DBLP, vol. 18, pp. 49–58 (2006)

    Google Scholar 

  10. Wu, C.: On web services access control based on quantified-role. Computer Applications and Software (2012)

    Google Scholar 

  11. Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

Supported by National Power Grid Corp headquarters project of science and technology: research and application of heterogeneous disaster recovery technology (No. 0711-150TL173).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, D., Li, J., Liu, S., Wang, C. (2017). Quantified Attribute Access Control Model for Cloud Storage Platform. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_70

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics