A Novel access control model in cloud computing environment (PAR-AC)

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.



  • Keywords

    Cloud Security; Access Control; Scalability; Policy Based Authentication; Two Factor Authentication.

  • References

      [1] Z. Shen and Q. Tong, “The security of cloud computing system enabled by trusted computing technology,” 2010 2nd Int. Conf. Signal Process. Syst., pp. V2-11-V2-15, 2010. https://doi.org/10.1109/ICSPS.2010.5555234.

      [2] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in Cloud Computing,” 2009 17th Int. Work. Qual. Serv., Jul. 2009, pp. 1–9.

      [3] L. Youseff, M. Butrico, and D. Da Silva, “Toward a Unified Ontology.”

      [4] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, 2008, p. 50. https://doi.org/10.1145/1496091.1496100.

      [5] S. Ullah and Z. Xuefeng, “Cloud Computing Research Challenges,” in proceedings of 5th IEEE International Conference on Biomedical Engineering and Informatics, 2012, pp. 1397–1401.

      [6] S. Ullah, Z. Xuefeng, and Z. Feng, “TCLOUD : A Multi – Factor Access Control Framework for Cloud Computing,” vol. 7, no. 2, 2013, pp. 15–26.

      [7] T. Cai, J. Zheng, and X. Du, “A hybrid attribute based RBAC model,” Int. J. Secur. its Appl., vol. 9, no. 7, 2015,pp. 317–328.

      [8] B. Lang, I. Foster, F. Siebenlist, R. Ananthakrishnan, and T. Freeman, “A flexible attribute based access control method for grid computing,” J. Grid Comput., vol. 7, no. 2, 2009, pp. 169–180. https://doi.org/10.1007/s10723-008-9112-1.

      [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” 2010 Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9. https://doi.org/10.1109/INFCOM.2010.5462174.

      [10] M. Sarfraz, A. A. Almutairi, and M. I. Sarfraz, “Access Control Architecture for Cloud Computing,” no. October 2014, 2012.

      [11] A. R. Khan, “Access Control in Cloud Computing Environment,” vol. 7, no. 5, 2012, pp. 1–4.

      [12] H. Andal and J. Narayanan, “Healthcare Systems,” 1st IEEE Int. Work. Consum. eHealth Platforms, Serv. Appl., 2011, pp. 247–251.

      [13] O. State, G. Polytechnic, and O. State, “A Modified Things Role Based Access Control Model for Securing Utilities in Cloud Computing,” vol. 5, no. 2, 2015, pp. 21–25.

      [14] Z. Tianyi, L. Weidong, and S. Jiaxing, “An Efficient Role Based Access Control System for Cloud Computing,” 2011 IEEE 11th Int. Conf. Comput. Inf. Technol., 2011, pp. 97–102. https://doi.org/10.1109/CIT.2011.36.

      [15] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy preserving access control with authentication for securing data in clouds,” Proc. - 12th IEEE/ACM Int. Symp. Clust. Cloud Grid Comput. CCGrid 2012, pp. 556–563. https://doi.org/10.1109/CCGrid.2012.92.

      [16] A. Anderson, “Core and hierarchical role based access control (RBAC) profile of XACML v2. 0,” OASIS Stand., no. February, 2005, pp. 1–23.

      [17] R. Oza, R. Patel, and A. Desai, “An Application of Hybrid ACL Approach in Cloud Environment,” Elsevier, 2013.

      [18] P. B. R. Kavali, “Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing,” vol. 3, no. 2, 2013, pp. 743–754.

      [19] D. R. Kuhn, E. J. Coyne, and T. R. Weil, “Adding attributes to role-based access control,” Computer (Long. Beach. Calif)., vol. 43, no. 6, 2010, pp. 79–81. https://doi.org/10.1109/MC.2010.155.

      [20] M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings,” 2010, pp. 89–90.

      [21] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. 5th ACM Symp. Information, Comput. Commun. Secur., 2010, pp. 261–270. https://doi.org/10.1145/1755688.1755720.

      [22] G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” Proc. 17th ACM Conf. Comput. Commun. Secur. - CCS ’10, 2010, p. 735. https://doi.org/10.1145/1866307.1866414.

      [23] F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6672 LNCS, 2011, pp. 83–97. https://doi.org/10.1007/978-3-642-21031-0_7.

      [24] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” Proc. 10th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2011, 8th IEEE Int. Conf. Embed. Softw. Syst. ICESS 2011, 6th Int. Conf. FCST 2011, 2011, pp. 91–98. https://doi.org/10.1109/TrustCom.2011.15.

      [25] W. Wang, J. Han, M. Song, and X. Wang, “The Design of a Trust and Role Based Access Control Model in Cloud Computing,” Ieee, 2011, pp. 330–334. https://doi.org/10.1109/ICPCA.2011.6106526.

      [26] J. Chen and T. Zhang, “Research and Implementation of Role-Based Access Control Model Based on Partition Number,” 2009, pp. 6–9.

      [27] Y. A. Younis, K. Kifayat, and M. Merabti, “An access control model for cloud computing,” J. Inf. Secur. Appl., vol. 19, no. 1, Feb. 2014,pp. 45–60. https://doi.org/10.1016/j.jisa.2014.04.003.

      [28] U. Mukhtar and A. Naushahi, “Profile-Based Access Control in Cloud Computing Environments with applications in Health Care Systems,” no. February, 2016.

      [29] A. Chen, H. Xing, K. She, and G. Duan, “A Dynamic Risk-Based Access Control Model for Cloud Computing,” 2016 IEEE Int. Conf. Big Data Cloud Comput. (BDCloud), Soc. Comput. Netw. (SocialCom), Sustain. Comput. Commun., no. 2014, 2016, pp. 579–584. https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.90.




Article ID: 13228
DOI: 10.14419/ijet.v7i3.13228

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.