Abstract
Access Control is an important component of Cloud Computing; specially, User access control management; however, Access Control in Cloud environment is different from traditional access environment and using general access control model can’t cover all entities within Cloud Computing, noting that Cloud environment includes different entities such as data owner, end user, and service provider. In this paper, we propose a new access control based on Role-based access control (RBAC) model. This model includes two kind of roles, user role (UR) and owner role (OR); such that, Users get credential from owners to communicate with service provider and to get access permissions of resources. We also discuss the aspects of user access control management, such as authentication, privilege management, and deprovisioning. Moreover, we use administrative scope to update hierarchy when there is a role added or revoked to simplify the user access control management. By applying the model in Cloud environment the results shows that it can reduce the security problems to two classes in the RT [ ← , ∩ ] role-based trust-management language with a test-paper system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control toEnforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3(2), 85–106 (2000)
Jiang, Y., Lin, C., Yin, H., Tan, Z.: Security Analysis of Maindatory Access Control Model, Systems, Man and Cybernetics 6, 5013–5018 (2004)
Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NISC National Computer Security Conference, October 13-16, pp. 554–563. Baltimore, MD (1992)
Joshi, J.B.D., Bertino, E., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. reference IEEECS (accepted December 9, 2003. Published online November 18, 2004)
Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for gtrbac. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 74–83. ACM, New York (2002)
Li, N., Tripunitara, M.V., Bizri, Z.: On mutually exclusive roles and separation of duty. ACM Transactions on Information and System Security 10(2) (May 2007)
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer 29(2) (February 1996)
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52(3), 474–514 (2005)
Koch, M., Mancini, L.V., Parisi-Presicce, F.: Decidability of Safety in Graph-Based Models for Access Control. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 229–243. Springer, Heidelberg (2002)
Li, N., Tripunitara, M.V.: Security Analysis in Role-Based Access Control. ACM Transactions on Information and System Security 9(4), 391–420 (2006)
Crampton, J., Loizou, G.: Administrative Scope: A Foundation for Role-Based Administrative Models. ACM Transactions on Information and System Security 6(2), 201–231 (2003)
Koch, M., Mancini, L.V., Parisi-Presicce, F.: Administrative scope in the graph-based framework. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004), pp. 97–104 (2004)
Jung, Y., Chung, M.: Adaptive Security Management Model in the Cloud Computing Environment. In: 2010 the 12th International Conference on Advanced Communication Technology (ICACT), vol. 2, pp. 1664–1669 (2010)
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: CCSW 2009, Chicago, Illinois, USA, November 13 (2009)
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy, pp. 18–19. O’Reilly Media, Inc. (2009)
Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NISTNCSC National Computer Security Conference, Baltimore, MD, October 13-16, pp. 554–563 (1992)
Nyanchama, M., Osborn, S.: Access rights administration in role-based security systems. In: Biskup, J., Morgernstern, M., Landwehr, C. (eds.) Database Security VIII: Status and Prospects. North-Holland (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tang, Z., Wei, J., Sallam, A., Li, K., Li, R. (2012). A New RBAC Based Access Control Model for Cloud Computing. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-30767-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30766-9
Online ISBN: 978-3-642-30767-6
eBook Packages: Computer ScienceComputer Science (R0)