Reference Hub10
Securing Data Storage By Extending Role-Based Access Control

Securing Data Storage By Extending Role-Based Access Control

Mamoon Rashid, Er. Rishma Chawla
Copyright: © 2013 |Volume: 3 |Issue: 4 |Pages: 10
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781466635012|DOI: 10.4018/ijcac.2013100103
Cite Article Cite Article

MLA

Rashid, Mamoon, and Er. Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." IJCAC vol.3, no.4 2013: pp.28-37. http://doi.org/10.4018/ijcac.2013100103

APA

Rashid, M. & Chawla, E. R. (2013). Securing Data Storage By Extending Role-Based Access Control. International Journal of Cloud Applications and Computing (IJCAC), 3(4), 28-37. http://doi.org/10.4018/ijcac.2013100103

Chicago

Rashid, Mamoon, and Er. Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control," International Journal of Cloud Applications and Computing (IJCAC) 3, no.4: 28-37. http://doi.org/10.4018/ijcac.2013100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.