Skip to main content
Log in

Contract RBAC in cloud computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing is a fast growing field, which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources based on their payments. The issue of access control is an important security scheme in the cloud computing. In this paper, a Contract RBAC model with continuous services for user to access various source services provided by different providers is proposed. The Contract RBAC model extending from the well-known RBAC model in cloud computing is shown. The extending definitions in the model could increase the ability to meet new challenges. The Contract RBAC model can provide continuous services with more flexible management in security to meet the application requirements including Intra-cross cloud service and Inter-cross cloud service. Finally, the performance analyses between the traditional manner and the scheme are given. Therefore, the proposed Contract RBAC model can achieve more efficient management for cloud computing environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2010) Above the clouds: a view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  2. Arnold S (2009) Cloud computing and the issue of privacy. KM World, 19 Aug 2009, pp. 14–22

  3. Carles MG, Guillermo NA, Joan B (2012) Intra-role progression in RBAC: an RPG-like access control scheme. In: Proc of DPM 2011 and SETOP 2011. LNCS, vol 7122, pp 221–234

    Google Scholar 

  4. Chen HC, Marcha AV (2013) A cognitive RBAC model with handover functions in small heterogeneous networks. Math Comput Model 58(5–6):1267–1288

    Article  Google Scholar 

  5. Chen HC, Wang SJ, Wen JH, Chen CW (2009) Temporal and location-based RBAC model. In: Proc of the fifth international joint conference on INC, IMS and IDC (MCM 2010), Seoul, Korea, Aug 25–27, pp 2111–2116

    Chapter  Google Scholar 

  6. Chen G, Zhang Y, Song M, Wang X (2009) Cognitive access control in cognitive heterogeneous networks. In: Proc of IEEE international conference on communications technology and applications (ICCTA -2009), pp 707–711

    Chapter  Google Scholar 

  7. Chirag M, Dhiren P, Bhavesh B, Avi P, Muttukrishnan R (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592

    Article  Google Scholar 

  8. Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224–274

    Article  Google Scholar 

  9. Li W, Wan H, Ren X, Li S (2012) A refined RBAC model for cloud computing. In: Proc of international conference on computer and information science (ACIS 2012), pp 43–48

    Google Scholar 

  10. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Article  Google Scholar 

  11. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Article  Google Scholar 

  12. Wang W, Han J, Song M, Wang X (2011) The design of a trust and role based access control model in cloud computing. In: Proc of international conference on pervasive computing and applications (ICPCA-2011), pp 26–28

    Google Scholar 

  13. Wikipedia (2013) Cloud computing. http://en.wikipedia.org/wiki/Cloud_computing

  14. Yau SS, An HG (2011) Software engineering meets services and cloud computing. IEEE Comput 44(10):47–53

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Asia University, Taiwan, under Grant 101-asia-28, also by the National Science Council, Taiwan, Republic of China, under Grant NSC 102-2221-E-468-007.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hsing-Chung (Jack) Chen or Cheng-Ying Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, HC.(., Violetta, M.A. & Yang, CY. Contract RBAC in cloud computing. J Supercomput 66, 1111–1131 (2013). https://doi.org/10.1007/s11227-013-1017-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-1017-5

Keywords

Navigation