Skip to main content
Top

2012 | OriginalPaper | Chapter

4. Design of Attribute-Based Access Control in Cloud Computing Environment

Authors : ByungRae Cha, JaeHyun Seo, JongWon Kim

Published in: Proceedings of the International Conference on IT Convergence and Security 2011

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Future Internet Groups have been studying networking virtualization and computing virtualization for Testbed. Specially, GENI have adopted cloud computing as computing virtualization technique. But the traditional access control models are closed and inflexible in cloud computing environment. The integration of Attribute Based Access Control (ABAC) model, which makes decisions relying on attributes of requestors, services, resources, and environment, is scalable and flexible and thus is more suitable for distributed, open systems, such as Cloud computing system. This paper presents an Attribute Based Access Control model and the authorization requirements of Cloud computing systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lampson BW (1971) Protection. In: Proceedings 5th Princeton conference on information sciences and systems, Princeton, pp 437–443 Lampson BW (1971) Protection. In: Proceedings 5th Princeton conference on information sciences and systems, Princeton, pp 437–443
2.
go back to reference Bell DE, LaPadula L (1973) Secure computer systems: a mathematical model. Mitre Corporation, Bedford (January) Bell DE, LaPadula L (1973) Secure computer systems: a mathematical model. Mitre Corporation, Bedford (January)
3.
go back to reference Sandhu RS, Samaratiy P (1994) Access control: principles and practice. IEEE Commun 32(9):40–48CrossRef Sandhu RS, Samaratiy P (1994) Access control: principles and practice. IEEE Commun 32(9):40–48CrossRef
4.
go back to reference Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J Supercomput Appl 15(3):200–222CrossRef Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J Supercomput Appl 15(3):200–222CrossRef
6.
go back to reference Ferraiolo DF, Kuhn DR (1992) Role based access control. 15th National Computer Security conference, October 1992 Ferraiolo DF, Kuhn DR (1992) Role based access control. 15th National Computer Security conference, October 1992
7.
go back to reference Blaze M, Feigenbaum J, Ioannidis J (1999) The KeyNote trust-management system version 2, IETF RFC 270 Blaze M, Feigenbaum J, Ioannidis J (1999) The KeyNote trust-management system version 2, IETF RFC 270
8.
go back to reference Pimlott A, Kiselyov O (2006) Soutei, a logic-based trust-management system. FLOPS 2006, In: 8th international symposium on functional and logic programming, Fuji-Susono, Japan, April 2006 Pimlott A, Kiselyov O (2006) Soutei, a logic-based trust-management system. FLOPS 2006, In: 8th international symposium on functional and logic programming, Fuji-Susono, Japan, April 2006
9.
go back to reference Damiani E, De Capitani di Vimercati S, Samarati P (2005) New paradigms for access control in open environments. In: Proceedings 5th IEEE international symposium on signal processing and information, Athens, Greece, 18–21 December 2005 Damiani E, De Capitani di Vimercati S, Samarati P (2005) New paradigms for access control in open environments. In: Proceedings 5th IEEE international symposium on signal processing and information, Athens, Greece, 18–21 December 2005
10.
go back to reference Bonatti P, Samarati P (2002) A unified framework for regulating access and information release on the web. J Comput Secur 10(3):241–272 Bonatti P, Samarati P (2002) A unified framework for regulating access and information release on the web. J Comput Secur 10(3):241–272
11.
go back to reference Wang L, Wijesekera D, Jajodia S (2004) A logic-based framework for attribute based access control. In: Proceedings 2004 ACM workshop on formal methods in security engineering, Washington, October 2004 Wang L, Wijesekera D, Jajodia S (2004) A logic-based framework for attribute based access control. In: Proceedings 2004 ACM workshop on formal methods in security engineering, Washington, October 2004
12.
go back to reference Yuan E, Tong J (2005) Attributed based access control (ABAC) for web services. In: Proceedings IEEE international conference on web services (ICW’05), July 2005 Yuan E, Tong J (2005) Attributed based access control (ABAC) for web services. In: Proceedings IEEE international conference on web services (ICW’05), July 2005
13.
go back to reference Welch V, Barton T, Keahey K, Siebenlist F (2005) Attributes, anonymity, and access: shibboleth and globus integration to facilitate grid collaboration. In: 4th Annual PKI R&D workshop, April 2005 Welch V, Barton T, Keahey K, Siebenlist F (2005) Attributes, anonymity, and access: shibboleth and globus integration to facilitate grid collaboration. In: 4th Annual PKI R&D workshop, April 2005
14.
go back to reference Barton T, Basney J, Freeman T, Scavo T, Siebenlist F, Welch V, Ananthakrishnan R, Baker B, Goode M, Keahey K (2006) Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, Gridshib, and MyProxy. In: 5th Annual PKI R&D workshop, April 2006 Barton T, Basney J, Freeman T, Scavo T, Siebenlist F, Welch V, Ananthakrishnan R, Baker B, Goode M, Keahey K (2006) Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, Gridshib, and MyProxy. In: 5th Annual PKI R&D workshop, April 2006
15.
go back to reference Alfteri R, Cecchini R, Ciaschini V, Dellagnello L, Frohner A, Gianoli A, Lorentey K, Spataro VOMS F (2003) An authorization system for virtual organizations. In: 1st European Across Grids conference, Santiago de Compostela, 13–14 February 2003 Alfteri R, Cecchini R, Ciaschini V, Dellagnello L, Frohner A, Gianoli A, Lorentey K, Spataro VOMS F (2003) An authorization system for virtual organizations. In: 1st European Across Grids conference, Santiago de Compostela, 13–14 February 2003
19.
go back to reference Lang B, Foster I, Siebenlist F, Ananthakrishnan R, Freeman T Attributed based access control for grid computing Lang B, Foster I, Siebenlist F, Ananthakrishnan R, Freeman T Attributed based access control for grid computing
20.
go back to reference Karp AH, Haury H, Davis MH (2009) From ABAC to ZBAC: the evolution of access control models. Hewlett-Packard Development Company, L. P., 21 February 2009 Karp AH, Haury H, Davis MH (2009) From ABAC to ZBAC: the evolution of access control models. Hewlett-Packard Development Company, L. P., 21 February 2009
Metadata
Title
Design of Attribute-Based Access Control in Cloud Computing Environment
Authors
ByungRae Cha
JaeHyun Seo
JongWon Kim
Copyright Year
2012
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-2911-7_4