skip to main content
10.1145/3450569.3464395acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
poster

Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions

Published: 11 June 2021 Publication History

Abstract

The increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in cloud security. Certain situations exist where it is necessary to restrict access to cloud resources based on time and location. An example is a policy for a medical institution where doctors can only access patient records at hospitals during their shifts. The Generalized Spatio-Temporal Role-Based Access Control model (GSTRBAC) determines users' access to resources based on such information. This poster proposes a cloud-based software architecture and outlines it possible implementation of the GSTRBAC model.

References

[1]
Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert B France. 2013. Specification, validation, and enforcement of a generalized spatio-temporal rolebased access control model. IEEE Systems Journal 7, 3 (2013), 501--515.
[2]
Monjur Ahmed and Alan T. Litchfield. 2018. Taxonomy for Identification of Security Issues in Cloud Computing Environments. Journal of Computer Information Systems 58, 1 (2018), 79--88. https://doi.org/10.1080/08874417.2016.1192520 arXiv:https://doi.org/10.1080/08874417.2016.1192520
[3]
Nuray Baltaci Akhuseyinoglu and James Joshi. 2017. A risk-aware access control framework for cyber-physical systems. In 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC). IEEE, 349--358.
[4]
Grady Booch, James E. Rumbaugh, and Ivar Jacobson. 2005. The unified modeling language user guide - covers UML 2.0, Second Edition. Addison-Wesley.
[5]
Yan Cao, Zhiqiu Huang, Yaoshen Yu, Changbo Ke, and ZihaoWang. 2020. A topology and risk-aware access control framework for cyber-physical space. Frontiers of Computer Science 14, 4 (2020), 1--16.
[6]
Amiya K Maji, Arpita Mukhoty, Arun K Majumdar, Jayanta Mukhopadhyay, Shamik Sural, Soubhik Paul, and Bandana Majumdar. 2008. Security analysis and implementation of web-based telemedicine services with a four-tier architecture. In 2008 Second International Conference on Pervasive Computing Technologies for Healthcare. IEEE, 46--54.
[7]
Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas, and Ioannis G Askoxylakis. 2018. Policy-Controlled Authenticated Access to LLNConnected Healthcare Resources. IEEE Systems Journal 12, 1 (2018), 92--102. https://doi.org/10.1109/JSYST.2015.2450313
[8]
Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, and Charles E Youman. 1996. Role-based access control models. Computer 29, 2 (1996), 38--47.
[9]
Yingjie Xue, Jianan Hong, Wei Li, Kaiping Xue, and Peilin Hong. 2016. LABAC: A location-aware attribute-based access control scheme for cloud storage. In 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, 1--6.

Cited By

View all

Index Terms

  1. Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies
    June 2021
    194 pages
    ISBN:9781450383653
    DOI:10.1145/3450569
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2021

    Check for updates

    Author Tags

    1. access control
    2. authorization
    3. location
    4. software
    5. time

    Qualifiers

    • Poster

    Conference

    SACMAT '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media