DocumentCode :
2427684
Title :
Access Control Management for Cloud
Author :
Habiba, Mansura ; Islam, Md Rafiqul ; Ali, A. B. M. Shawkat
Author_Institution :
Dept. of Comput. Sci., American Int. Univ. Bangladesh, Dhaka, Bangladesh
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
485
Lastpage :
492
Abstract :
Managing data access control in an authorized and authenticated way is still one of the key challenge in cloud security. In a complex environment like cloud, data owner and Cloud Service Provider (CSP) need to monitor continuously who is accessing which data in order to prevent unauthorized access. Moreover, it should be pre-defined that who can perform which operation on particular data, which can reduce unauthorized access to a great extent. In this regard, user´s access to any data, application and services reside in cloud should be controlled, managed dynamically and monitored continuously. Most of cases the traditional system is not efficient enough to cope up with dynamic cloud environment, due to high dynamicity, data virtualization and multi-tenancy, higher scalability and higher degree of integrity. Existing systems also merely provide efficient auditing and reporting functionality regarding access control management. In this research we have designed a data intensive dynamic access control model for cloud environment. Several authorization algorithms are devised in this paper. Our proposed access control model has portrayed the system framework and different module along with their functionalities. Multi Agent based System (MAS) is represented to define the accessibility and functionality of the proposed model. Moreover, an enhanced authorization scheme is driven in this work to improve the security of the proposed system. We have also represented security and efficiency analysis of proposed models which has shown that our proposed scheme is efficient and secured enough to deals with the access control management.
Keywords :
Internet of Things; authorisation; cloud computing; multi-agent systems; CSP; authentication; authorization algorithms; cloud computing; cloud service provider; data access control management; data intensive dynamic access control model; data multitenancy; data virtualization; dynamic cloud environment; efficiency analysis; integrity degree; multi-agent based system; scalability; security analysis; Authentication; Authorization; Cloud computing; Data models; Permission; Cloud computing; access control; audit; authorization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.61
Filename :
6680878
Link To Document :
بازگشت