Title :
A Semi-distributed Access Control Management Scheme for Securing Cloud Environment
Author :
Rizvi, Syed ; Mitchell, John
Author_Institution :
Dept. of Inf. Sci. & Technol., Pennsylvania State Univ., Altoona, PA, USA
Abstract :
Despite numerous advantages that cloud computing offer (e.g., Flexibility, elasticity, scalability, etc.), many potential clients are still hesitant to join the cloud due to their security and privacy concerns. Outsourcing the data to a cloud in a multitenant environment brings many security challenges including data leaks, threats, and malicious attacks. The cloud computing platform, virtual servers, and the provider´s services are highly dynamic and diverse in nature, making the traditional access control mechanisms (e.g., Firewalls and VLAN etc.) less effective in controlling the unauthorized access to cloud´s data and resources. Several access control policies and authorization system have been proposed in literature to defend against cloud security threats. Most of these systems are designed to work with one or more access control policies. However, little work has been done to develop generic access control architecture capable to work with most of the available access control policies. In this paper, we present a new access control architecture using a global resource management system (GRMS) to effectively handle both local and remote access requests. The introduction of GRMS makes our proposed architecture semi distributed at the expense of minimal request-response time. In addition, our proposed architecture works effectively with both peered access control module (PACM) and virtual resource manager (VRM) to protect and manage all resources and services of cloud providers from unauthorized access.
Keywords :
authorisation; cloud computing; data privacy; file servers; resource allocation; GRMS; PACM; VRM; access control mechanisms; authorization system; cloud computing; cloud environment security; cloud providers; cloud security threats; data leaks; generic access control architecture; global resource management system; malicious attacks; multitenant environment; peered access control module; privacy concerns; security challenges; security concerns; semidistributed access control management scheme; unauthorized access; virtual resource manager; virtual servers; Authorization; Cloud computing; Computer architecture; Containers; Virtualization; Access control; cloud computing; role based access control; side channel attack; virtual resource manager;
Conference_Titel :
Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on
Conference_Location :
New York City, NY
Print_ISBN :
978-1-4673-7286-2
DOI :
10.1109/CLOUD.2015.73