• DocumentCode
    184992
  • Title

    Towards a Fine-Grained Access Control for Cloud

  • Author

    Msahli, Mounira ; Xiuzhen Chen ; Serhrouchni, Ahmed

  • Author_Institution
    INFRES, Telecom Paristech, Paris, France
  • fYear
    2014
  • fDate
    5-7 Nov. 2014
  • Firstpage
    286
  • Lastpage
    291
  • Abstract
    The centerpiece of an efficient Cloud security architecture is a well-defined access control policy. In literature we can find several access control models such as the Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONABC). The UCONABC is very suitable for the context of distributed systems like cloud computing but it doesn´t give any implementation method. In this paper we define the profile centric model using graph formalism and its implementation using matrix. We define the profile as the combination of all possible authorization, obligation, condition, role, etc... and other access parameters like attributes that we can found in Cloud system. We discuss its application using three matrixes (profile definition, profile inheritance and user assignment). Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing. The proposed solution is validated and implemented over Hadoop distributed file system in the context of Safe Box as a service.
  • Keywords
    authorisation; cloud computing; file organisation; parallel processing; DAC; Hadoop distributed file system; MAC; RBAC; Safe Box; UCONABC; authorization; cloud computing; cloud security architecture; complex distributed elastic system; discretionary access control; fine-grained access control policy; graph formalism; mandatory access control; obligation and condition; profile centric model; profile definition; profile inheritance; role-based access control; usage control authorization; user assignment; Adaptation models; Authorization; Cloud computing; Computational modeling; Context; Cloud; Profile centric model; Safe Box; access control; graph; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Business Engineering (ICEBE), 2014 IEEE 11th International Conference on
  • Conference_Location
    Guangzhou
  • Print_ISBN
    978-1-4799-6562-5
  • Type

    conf

  • DOI
    10.1109/ICEBE.2014.56
  • Filename
    6982094