Abstract
Cloud computing is a fast growing field, which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources based on their payments. The issue of access control is an important security scheme in the cloud computing. In this paper, a Contract RBAC model with continuous services for user to access various source services provided by different providers is proposed. The Contract RBAC model extending from the well-known RBAC model in cloud computing is shown. The extending definitions in the model could increase the ability to meet new challenges. The Contract RBAC model can provide continuous services with more flexible management in security to meet the application requirements including Intra-cross cloud service and Inter-cross cloud service. Finally, the performance analyses between the traditional manner and the scheme are given. Therefore, the proposed Contract RBAC model can achieve more efficient management for cloud computing environments.
Similar content being viewed by others
References
Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2010) Above the clouds: a view of cloud computing. Commun ACM 53(4):50–58
Arnold S (2009) Cloud computing and the issue of privacy. KM World, 19 Aug 2009, pp. 14–22
Carles MG, Guillermo NA, Joan B (2012) Intra-role progression in RBAC: an RPG-like access control scheme. In: Proc of DPM 2011 and SETOP 2011. LNCS, vol 7122, pp 221–234
Chen HC, Marcha AV (2013) A cognitive RBAC model with handover functions in small heterogeneous networks. Math Comput Model 58(5–6):1267–1288
Chen HC, Wang SJ, Wen JH, Chen CW (2009) Temporal and location-based RBAC model. In: Proc of the fifth international joint conference on INC, IMS and IDC (MCM 2010), Seoul, Korea, Aug 25–27, pp 2111–2116
Chen G, Zhang Y, Song M, Wang X (2009) Cognitive access control in cognitive heterogeneous networks. In: Proc of IEEE international conference on communications technology and applications (ICCTA -2009), pp 707–711
Chirag M, Dhiren P, Bhavesh B, Avi P, Muttukrishnan R (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224–274
Li W, Wan H, Ren X, Li S (2012) A refined RBAC model for cloud computing. In: Proc of international conference on computer and information science (ACIS 2012), pp 43–48
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
Wang W, Han J, Song M, Wang X (2011) The design of a trust and role based access control model in cloud computing. In: Proc of international conference on pervasive computing and applications (ICPCA-2011), pp 26–28
Wikipedia (2013) Cloud computing. http://en.wikipedia.org/wiki/Cloud_computing
Yau SS, An HG (2011) Software engineering meets services and cloud computing. IEEE Comput 44(10):47–53
Acknowledgements
This work was supported in part by Asia University, Taiwan, under Grant 101-asia-28, also by the National Science Council, Taiwan, Republic of China, under Grant NSC 102-2221-E-468-007.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Chen, HC.(., Violetta, M.A. & Yang, CY. Contract RBAC in cloud computing. J Supercomput 66, 1111–1131 (2013). https://doi.org/10.1007/s11227-013-1017-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-1017-5