skip to main content
10.1145/3017971.3017979acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

A Dynamic Access Control Model for Cloud Computing Environments

Published: 26 November 2016 Publication History

Abstract

Cloud Computing allows persons and organizations to store and process their resources in data centers. It is a flexible and cost-effective solution providing various services to consumers over the internet.
The transition towards the Cloud implies losing the consumer the ability to control access to his resources. As a result, sensitive data are at risk from attacks since Cloud becomes an attractive target for hackers. Therefore, the provider must ensure protection of consumers' resources by developing suitable access control policies.
This paper proposes a novel access control model for Cloud Computing systems inspired by OrBAC model, based on trust evaluation, and introduced a Trusted Third Party controlling interactions between access requestor and the system that hosts requested resources.

References

[1]
Y. Jadeja and K. Modi, "Cloud computing-concepts, architecture and challenges," in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, 2012, pp. 877--880.
[2]
K. S. S. Bulusu and K. Sudia, "A Study on Cloud Computing Security Challenges," Master's thesis, School of Computing Blekinge Institute of Technology SE-371, vol. 79, 2012.
[3]
A. A. Elmrabti, A. A. E. Kalam, and A. A. Ouahman, "Les défis de sécuritédans le Cloud Computing: Problèmes et solutions de la sécuritéen Cloud Computing," in Network Security and Systems (JNS2), 2012 National Days of, 2012, pp. 80--85.
[4]
K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des donnéesentreposéesdans les nuages," in 9ème atelier Fouille de données complexes (EGC-FDC 2012), 2012.
[5]
C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in Cloud computing," Computers & Electrical Engineering, vol. 39, no. 1, pp. 47--54, Jan. 2013.
[6]
M. Cheaito, "Un cadre de spécification et de déploiement de politiquesd' autorisation," Université de Toulouse, Université Toulouse III-Paul Sabatier, 2012.
[7]
R. Ausanka-Crues, "Methods for access control: advances and limitations," Harvey Mudd College, vol. 301, 2001.
[8]
G. A. Jeffrey and G. A. Jeffrey, An introduction to hydrogen bonding, vol. 12. Oxford university press New York, 1997.
[9]
A. A. El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin, "Or-BAC: un modele de contrôled' accesbasé sur les organisations," Cahiers francophones de la rechercheensécurité de l'information, vol. 1, pp. 30--43, 2003.
[10]
E. ENST, "AdOrBAC: An Administration Model for Or-BAC."
[11]
F. Cuppens and A. Miège, "Modelling contexts in the Or-BAC model," in Computer Security Applications Conference, 2003.Proceedings. 19th Annual, 2003, pp. 416--425.
[12]
F. Autrel, F. Cuppens, N. Cuppens-Boulahia, and C. Coma, "MotOrBAC 2: a security policy tool," in 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008), Loctudy, France, 2008, pp. 273--288.
[13]
Xi. Sun, G. Chang, and F. Li, "A Trust Management Model to Enhance Security of Cloud Computing Environments," 2011, pp. 244--248.
[14]
M. K. Muchahari and S. K. Sinha, "A New Trust Management Architecture for Cloud Computing Environment," 2012, pp. 136--140.
[15]
A. S. Saleh, E. M. R. Hamed, M. Hashem, and others, "Building trust management model for Cloud computing," in Informatics and Systems (INFOS), 2014 9th International Conference on, 2014, p. PDC--116.
[16]
W. Li, L. Ping, Q. Qiu, and Q. Zhang, "Research on trust management strategies in Cloud computing environment," Journal of Computational Information Systems, vol. 8, no. 4, pp. 1757--1763, 2012.
[17]
S. M. Habib, S. Ries, and M. Muhlhauser, "Towards a Trust Management System for Cloud Computing," 2011, pp. 933--939.
[18]
W. Li, L. Ping, and X. Pan, "Use trust management module to achieve effective security mechanisms in Cloud environment," in Electronics and Information Engineering (ICEIE), 2010 International Conference On, 2010, vol. 1, pp. V1--14.
[19]
M. Firdhous, O. Ghazali, and S. Hassan, "Trust management in Cloud computing: a critical review," arXiv preprint arXiv:1211.3979, 2012.
[20]
X. W. -, "A Fuzzy Reputation-based Trust Management Scheme for Cloud Computing," International Journal of Digital Content Technology and its Applications, vol. 6, no. 17, pp. 437--445, Sep. 2012.
[21]
X.-Y. Li, L.-T. Zhou, Y. Shi, and Y. Guo, "A trusted computing environment model in Cloud architecture," in Machine Learning and Cybernetics (ICMLC), 2010 International Conference on, 2010, vol. 6, pp. 2843--2848.
[22]
L. A. Martucci, A. Zuccato, B. Smeets, S. M. Habib, T. Johansson, and N. Shahmehri, "Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry," 2012, pp. 627--632.
[23]
H. Sato, A. Kanai, and S. Tanimoto, "A Cloud Trust Model in a Security Aware Cloud," 2010, pp. 121--124.
[24]
Z. Song, J. Molina, and C. Strong, "Trusted Anonymous Execution: A Model to Raise Trust in Cloud," 2010, pp. 133--138.
[25]
S.-X. Wang, L. Zhang, S. Wang, and X. Qiu, "A Cloud-based trust model for evaluating quality of web services," Journal of Computer Science and Technology, vol. 25, no. 6, pp. 1130--1142, 2010.
[26]
W. W. Smari, Association for Computing Machinery, and Institute of Electrical and Electronics Engineers, Eds., 2009 International Conference on High Performance Computing & Simulation: HPCS 2009; Leipzig, Germany, 21-24 June 2009; [including workshop papers]. Piscataway, NJ: IEEE, 2009.
[27]
2012 National Days of Network Security and Systems (JNS2 2012): Marrakech, Morocco, 20-21 April 2012. Piscataway, NJ: IEEE, 2012.
[28]
B. F. Chellas, Modal logic: an introduction. Cambridge [Eng.]; New York: Cambridge University Press, 1980.
[29]
M. B. Saidi and A. Marzouk, "Access Control Protocol for Cloud Systems Based On the Model TOrBAC."
[30]
T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, "Trust management of services in Cloud environments: Obstacles and solutions," ACM Computing Surveys, vol. 46, no. 1, pp. 1--30, Oct. 2013.
[31]
K. Toumi, C. Andrés, and A. Cavalli, "Trust-orbac: A trust access control model in multi-organization environments," in Information Systems Security, Springer, 2012, pp. 89--103.

Cited By

View all
  • (2020)Access Control Policies for Network Function Virtualization environments in Industrial Control Systems2020 4th Conference on Cloud and Internet of Things (CIoT)10.1109/CIoT50422.2020.9244205(17-24)Online publication date: 7-Oct-2020
  • (2019)A Dynamic Adaptive Access Control Scheme for Hadoop Platform2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)10.1109/CCET48361.2019.8989081(79-83)Online publication date: Aug-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCNS '16: Proceedings of the 6th International Conference on Communication and Network Security
November 2016
133 pages
ISBN:9781450347839
DOI:10.1145/3017971
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Access control
  2. Cloud Computing
  3. OrBAC
  4. dynamic model
  5. security policy
  6. trust

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCNS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Access Control Policies for Network Function Virtualization environments in Industrial Control Systems2020 4th Conference on Cloud and Internet of Things (CIoT)10.1109/CIoT50422.2020.9244205(17-24)Online publication date: 7-Oct-2020
  • (2019)A Dynamic Adaptive Access Control Scheme for Hadoop Platform2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)10.1109/CCET48361.2019.8989081(79-83)Online publication date: Aug-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media