Abstract
Future Internet Groups have been studying networking virtualization and computing virtualization for Testbed. Specially, GENI have adopted cloud computing as computing virtualization technique. But the traditional access control models are closed and inflexible in cloud computing environment. The integration of Attribute Based Access Control (ABAC) model, which makes decisions relying on attributes of requestors, services, resources, and environment, is scalable and flexible and thus is more suitable for distributed, open systems, such as Cloud computing system. This paper presents an Attribute Based Access Control model and the authorization requirements of Cloud computing systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAbbreviations
- A:
-
directional orientation of the system
- H:
-
strip thickness with strip thickness and strip thickness strip thickness
References
Lampson BW (1971) Protection. In: Proceedings 5th Princeton conference on information sciences and systems, Princeton, pp 437–443
Bell DE, LaPadula L (1973) Secure computer systems: a mathematical model. Mitre Corporation, Bedford (January)
Sandhu RS, Samaratiy P (1994) Access control: principles and practice. IEEE Commun 32(9):40–48
Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J Supercomput Appl 15(3):200–222
en.wikipedia.org/wiki/Intercloud
Ferraiolo DF, Kuhn DR (1992) Role based access control. 15th National Computer Security conference, October 1992
Blaze M, Feigenbaum J, Ioannidis J (1999) The KeyNote trust-management system version 2, IETF RFC 270
Pimlott A, Kiselyov O (2006) Soutei, a logic-based trust-management system. FLOPS 2006, In: 8th international symposium on functional and logic programming, Fuji-Susono, Japan, April 2006
Damiani E, De Capitani di Vimercati S, Samarati P (2005) New paradigms for access control in open environments. In: Proceedings 5th IEEE international symposium on signal processing and information, Athens, Greece, 18–21 December 2005
Bonatti P, Samarati P (2002) A unified framework for regulating access and information release on the web. J Comput Secur 10(3):241–272
Wang L, Wijesekera D, Jajodia S (2004) A logic-based framework for attribute based access control. In: Proceedings 2004 ACM workshop on formal methods in security engineering, Washington, October 2004
Yuan E, Tong J (2005) Attributed based access control (ABAC) for web services. In: Proceedings IEEE international conference on web services (ICW’05), July 2005
Welch V, Barton T, Keahey K, Siebenlist F (2005) Attributes, anonymity, and access: shibboleth and globus integration to facilitate grid collaboration. In: 4th Annual PKI R&D workshop, April 2005
Barton T, Basney J, Freeman T, Scavo T, Siebenlist F, Welch V, Ananthakrishnan R, Baker B, Goode M, Keahey K (2006) Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, Gridshib, and MyProxy. In: 5th Annual PKI R&D workshop, April 2006
Alfteri R, Cecchini R, Ciaschini V, Dellagnello L, Frohner A, Gianoli A, Lorentey K, Spataro VOMS F (2003) An authorization system for virtual organizations. In: 1st European Across Grids conference, Santiago de Compostela, 13–14 February 2003
http://groups.geni.net/geni/attachment/wiki/ABAC/geni-rbac-req-0.5a.pdf
Lang B, Foster I, Siebenlist F, Ananthakrishnan R, Freeman T Attributed based access control for grid computing
Karp AH, Haury H, Davis MH (2009) From ABAC to ZBAC: the evolution of access control models. Hewlett-Packard Development Company, L. P., 21 February 2009
Acknowledgments
This work was supported by the National Research Foundation of Korea Grant funded by the Korean Government [NRF-2009-353-D00048]. This research was supported by the KCC (Korea Communications Commission), Korea, under the R&D program supervised by the KCA (Korea Communications Agency) [KCA-2011-09913-05006].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Cha, B., Seo, J., Kim, J. (2012). Design of Attribute-Based Access Control in Cloud Computing Environment. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_4
Download citation
DOI: https://doi.org/10.1007/978-94-007-2911-7_4
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2910-0
Online ISBN: 978-94-007-2911-7
eBook Packages: EngineeringEngineering (R0)