skip to main content
10.1145/2996429.2996431acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments

Published:28 October 2016Publication History

ABSTRACT

Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions make use of XACML to specify such policies. However, existing implementations of XACML perform a brute force search to compare a request to all existing rules in a given XACML policy. This decreases the decision process (i.e., policy evaluation) performance especially for policies with a large number of rules. In this paper, we propose an automata-based approach for an efficient XACML policy evaluation. We implemented our approach in a cloud policy engine called X2Automata. The engine first converts both XACML policies and access requests to automata. Second, it combines the two automata by a synchronous product. Third, it applies an evaluation procedure to the resulting automaton to decide whether an access request is granted or not. To highlight the efficiency of X2Automata, we compare its performance, based on the OpenStack cloud environment, with the XACML implementation named Balana.

References

  1. M. Almorsy, J. Grundy, and A. S. Ibrahim. Collaboration-based cloud computing security management framework. In 2011 IEEE International Conference on Cloud Computing, pages 364--371. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (epal). IBM Research, 2003.Google ScholarGoogle Scholar
  3. M. Ayache, M. Erradi, and B. Freisleben. Access control policies enforcement in a cloud environment: OpenStack. In 2015 11th International Conference on Information Assurance and Security (IAS), pages 26--31. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. Ayache, M. Erradi, and B. Freisleben. curlx: A middleware to enforce access control policies within a cloud environment. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 771--772. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Ayache, M. Erradi, A. Khoumsi, and B. Freisleben. Analysis and verification of XACML policies in a medical cloud environment. Scalable Computing: Practice and Experience, 17 (3): 189--206, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Kabbedijk, C.-P. Bezemer, S. Jansen, and A. Zaidman. Defining multi-tenancy: A systematic mapping study on the academic and the industrial perspective. Journal of Systems and Software, 100: 139--148, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. X. Liu, F. Chen, J. Hwang, and T. Xie. Xengine: a fast and scalable xacml policy evaluation engine. ACM SIGMETRICS Performance Evaluation Review, 36 (1): 265--276, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Moses et al. Extensible access control markup language (xacml) version 2.0. Oasis Standard, 200502, 2005.Google ScholarGoogle Scholar
  9. A. Mourad and H. Jebbaoui. SBA-XACML: set-based approach providing efficient policy decision process for accessing web services. Expert Systems with Applications, 42 (1): 165--178, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Ngo, Y. Demchenko, and C. de Laat. Decision diagrams for XACML policy evaluation and management. Computers & Security, 49: 1--16, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security Workshop
          October 2016
          116 pages
          ISBN:9781450345729
          DOI:10.1145/2996429

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          CCSW '16 Paper Acceptance Rate8of23submissions,35%Overall Acceptance Rate37of108submissions,34%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA
        • Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader