Abstract
Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the granularity of the model elements and the dynamics which leads the security of the resource in cloud computing is limited. In this paper, a quantified attribute-based access control (QABAC) model is proposed. The concept of quantified attribute and trust degree is defined. Three attribute quantization functions are proposed for dynamically calculation, and the security degree of the access will be obtained. Finally the authorization policy determines final permission according to the trust degree. Compared with other traditional models, QABAC is flexible, extensible and dynamic. It will not only protect the security of resource among potential attack from network, but also has the capacity to meet the performance requirement in practical applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Beak, J., Vu, Q.H., Liu, J.K., et al.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)
Liu, Q.Y., Sha, H.Z., Shi-Ming, L.I., et al.: An access control method based on quantified services and roles in large scale of network visits. Chin. J. Comput. (2014)
Almutairi, A., Sarfraz, M., Basalamah, S., et al.: A distributed access control architecture for cloud computing. IEEE Softw. 29(2), 36–44 (2011)
Xia, Z., Wang, X., Zhang, L., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Tran. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Younis, A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 45–60 (2014)
Yang, K., Liu, Z., Jia, X., et al.: Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans. Multimedia 18(5), 940–950 (2016)
Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for k-barrier coverage based on integer linear programming. Chin. Commun. 13(7), 16–23 (2016)
Simmhan, Y., Kumbhare, A.G., Cao, B., et al.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing, pp. 582–589. IEEE Computer Society (2011)
Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: SACMAT 2006, ACM Symposium on Access Control MODELS and Technologies, DBLP, vol. 18, pp. 49–58 (2006)
Wu, C.: On web services access control based on quantified-role. Computer Applications and Software (2012)
Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)
Acknowledgments
Supported by National Power Grid Corp headquarters project of science and technology: research and application of heterogeneous disaster recovery technology (No. 0711-150TL173).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, D., Li, J., Liu, S., Wang, C. (2017). Quantified Attribute Access Control Model for Cloud Storage Platform. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_70
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_70
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)