Title :
Access control in probative value Cloud
Author :
Msahli, Mounira ; Abdeljaoued, Rached ; Serhrouchni, Ahmed
Author_Institution :
INFRES, Telecom Paristech., Paris, France
Abstract :
Access Control over large scale distributed system like Cloud computing are one of the most debated topics of computer security. Despite the common use and the popularity of the Cloud computing paradigm, significant risks and challenges are inherent to this new concept, especially when we talk about storage of sensitive data via insecure network. In this paper we look at the problem of protecting data from unauthorized access to the Cloud in the context of gSafe (government Safe) project. Indeed, gSafe project defines essential basic units for a probative storage Cloud. The cornerstone of the efficient cloud security architecture is a well-written access control policy. In today´s information technology, many models of access control have been proposed like the Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONABc). In this paper we use six entities proposed in the UCONABC: Object, Subject, Right, Authorization, oBligation and Condition to model the access control management in the gSafe project. Then we present the XML scheme containing metadata for stored files and users´ access authorizations. The proposed solution is validated and implemented over Hadoop distributed file system.
Keywords :
XML; authorisation; cloud computing; distributed processing; meta data; software architecture; storage management; DAC; Hadoop distributed file system; MAC; RBAC; UCONABc; XML scheme; access authorization; access control management; cloud computing; cloud security architecture; computer security; data protection; discretionary access control; gSafe project; government Safe project; information technology; insecure network; large scale distributed system; mandatory access control; metadata; probative storage cloud; probative value cloud; role-based access control; sensitive data; stored files; unauthorized access; usage control authorization obligation and condition; well-written access control policy; Authorization; Bellows; Computers; Cryptography; Portable document format; XML; Access Control; Cloud; SBaaS; Security; UCONABC;
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
DOI :
10.1109/ICITST.2013.6750274