Skip to main content

A New RBAC Based Access Control Model for Cloud Computing

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7296))

Included in the following conference series:

Abstract

Access Control is an important component of Cloud Computing; specially, User access control management; however, Access Control in Cloud environment is different from traditional access environment and using general access control model can’t cover all entities within Cloud Computing, noting that Cloud environment includes different entities such as data owner, end user, and service provider. In this paper, we propose a new access control based on Role-based access control (RBAC) model. This model includes two kind of roles, user role (UR) and owner role (OR); such that, Users get credential from owners to communicate with service provider and to get access permissions of resources. We also discuss the aspects of user access control management, such as authentication, privilege management, and deprovisioning. Moreover, we use administrative scope to update hierarchy when there is a role added or revoked to simplify the user access control management. By applying the model in Cloud environment the results shows that it can reduce the security problems to two classes in the RT [ ← , ∩ ] role-based trust-management language with a test-paper system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control toEnforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3(2), 85–106 (2000)

    Article  Google Scholar 

  2. Jiang, Y., Lin, C., Yin, H., Tan, Z.: Security Analysis of Maindatory Access Control Model, Systems, Man and Cybernetics 6, 5013–5018 (2004)

    Google Scholar 

  3. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NISC National Computer Security Conference, October 13-16, pp. 554–563. Baltimore, MD (1992)

    Google Scholar 

  4. Joshi, J.B.D., Bertino, E., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. reference IEEECS (accepted December 9, 2003. Published online November 18, 2004)

    Google Scholar 

  5. Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for gtrbac. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 74–83. ACM, New York (2002)

    Chapter  Google Scholar 

  6. Li, N., Tripunitara, M.V., Bizri, Z.: On mutually exclusive roles and separation of duty. ACM Transactions on Information and System Security 10(2) (May 2007)

    Google Scholar 

  7. Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer 29(2) (February 1996)

    Google Scholar 

  8. Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52(3), 474–514 (2005)

    Article  MathSciNet  Google Scholar 

  9. Koch, M., Mancini, L.V., Parisi-Presicce, F.: Decidability of Safety in Graph-Based Models for Access Control. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 229–243. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Li, N., Tripunitara, M.V.: Security Analysis in Role-Based Access Control. ACM Transactions on Information and System Security 9(4), 391–420 (2006)

    Article  Google Scholar 

  11. Crampton, J., Loizou, G.: Administrative Scope: A Foundation for Role-Based Administrative Models. ACM Transactions on Information and System Security 6(2), 201–231 (2003)

    Article  Google Scholar 

  12. Koch, M., Mancini, L.V., Parisi-Presicce, F.: Administrative scope in the graph-based framework. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004), pp. 97–104 (2004)

    Google Scholar 

  13. Jung, Y., Chung, M.: Adaptive Security Management Model in the Cloud Computing Environment. In: 2010 the 12th International Conference on Advanced Communication Technology (ICACT), vol. 2, pp. 1664–1669 (2010)

    Google Scholar 

  14. Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: CCSW 2009, Chicago, Illinois, USA, November 13 (2009)

    Google Scholar 

  15. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy, pp. 18–19. O’Reilly Media, Inc. (2009)

    Google Scholar 

  16. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NISTNCSC National Computer Security Conference, Baltimore, MD, October 13-16, pp. 554–563 (1992)

    Google Scholar 

  17. Nyanchama, M., Osborn, S.: Access rights administration in role-based security systems. In: Biskup, J., Morgernstern, M., Landwehr, C. (eds.) Database Security VIII: Status and Prospects. North-Holland (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tang, Z., Wei, J., Sallam, A., Li, K., Li, R. (2012). A New RBAC Based Access Control Model for Cloud Computing. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30767-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30766-9

  • Online ISBN: 978-3-642-30767-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics