Skip to main content
Top

2017 | OriginalPaper | Chapter

Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms

Authors : Abed Alshreef, Lin Li, Wahid Rajeh

Published in: Information Science and Applications 2017

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing users can use at the same time the same cloud service. So, there is a need for having an access control mechanism to ensure that each user cannot access any sensitive data of other users. Several access control models have been proposed for cloud computing. However, these models need to be efficient and scalable due to increased workload (e.g., users, policies, etc.) in the cloud. This paper presents a role based access control model (RBAC) for cloud computing based on naming convention (NC) concept. The WSLA specification language is used for SLAs specification. A naming convention role based access control (NC-RBAC) is presented by modifying the standard RBAC to support the NC. Then, the proposed framework is designed based on the NC-RBAC to offer a simplified designed for the system administration of security in a large institution where there are many users is challenging to control access to resources. The proposed framework is implemented and its efficiency and scalability are measured using an experiment study. The result shows that the proposed framework provides an efficient and scalable access control for cloud computing while provides an administrator with an efficient and simple search method for classifying the cloud users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mena, E., Kashyap, V., Sheth, A., Illarramendi, A.: OBSERVER: an approach for query processing in global information systems based on interoperation across pre-existing ontologies. Distrib. Parallel Databases 8(2), 223–271 (2000)CrossRef Mena, E., Kashyap, V., Sheth, A., Illarramendi, A.: OBSERVER: an approach for query processing in global information systems based on interoperation across pre-existing ontologies. Distrib. Parallel Databases 8(2), 223–271 (2000)CrossRef
2.
go back to reference Gao, K., Wang, Q., Xi, L.: Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. Int. Arab J. Inf. Technol. 11(3), 268–275 (2014) Gao, K., Wang, Q., Xi, L.: Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. Int. Arab J. Inf. Technol. 11(3), 268–275 (2014)
3.
go back to reference Singh, S. (ed.): A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016) Singh, S. (ed.): A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
4.
go back to reference Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1948–1960 (2013)CrossRef Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1948–1960 (2013)CrossRef
5.
go back to reference Platt, D.: Untangling access control and audit for cloud computing. In: Cloud Computing Virtual Conference (Cloud Slam 2010) (2009) Platt, D.: Untangling access control and audit for cloud computing. In: Cloud Computing Virtual Conference (Cloud Slam 2010) (2009)
6.
go back to reference Hu, L., Ying, S., Jia, X., Zhao, K.: Towards an approach of semantic access control for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 145–156. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_13 CrossRef Hu, L., Ying, S., Jia, X., Zhao, K.: Towards an approach of semantic access control for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 145–156. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-10665-1_​13 CrossRef
7.
go back to reference Urquhart, J.: Cloud Computing Bill of Rights: 2010 edition (2010) Urquhart, J.: Cloud Computing Bill of Rights: 2010 edition (2010)
8.
go back to reference Manue, P.D., Selvi, S.T., Barr, M.I.: Trust management system for grid and cloud resources. In: First International Conference on Advanced Computing (ICAC9), pp. 176–181. Chennai (2009) Manue, P.D., Selvi, S.T., Barr, M.I.: Trust management system for grid and cloud resources. In: First International Conference on Advanced Computing (ICAC9), pp. 176–181. Chennai (2009)
9.
go back to reference Ali, T., Nauman, M., Fazl-e, H., Muhaya, F.B.: On usage control of multimedia content in and through cloud computing paradigm. In: 5th International Conference on Future Information Technology (FutureTech), pp. 1–5. Busan (2010) Ali, T., Nauman, M., Fazl-e, H., Muhaya, F.B.: On usage control of multimedia content in and through cloud computing paradigm. In: 5th International Conference on Future Information Technology (FutureTech), pp. 1–5. Busan (2010)
10.
go back to reference Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 29th Conference on Computer Communications, pp. 1–9. San Diego, CA, USA (2010) Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 29th Conference on Computer Communications, pp. 1–9. San Diego, CA, USA (2010)
11.
go back to reference Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52, 474–514 (2005)MathSciNetCrossRefMATH Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52, 474–514 (2005)MathSciNetCrossRefMATH
12.
go back to reference Ngo, C. (ed.): Multi-tenant attribute-based access control for cloud infrastructure services. J. Inf. Secur. Appl. 27–28, 65–84 (2016) Ngo, C. (ed.): Multi-tenant attribute-based access control for cloud infrastructure services. J. Inf. Secur. Appl. 27–28, 65–84 (2016)
13.
go back to reference Tsai, W-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, Tokyo & Hiroshima (2011) Tsai, W-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, Tokyo & Hiroshima (2011)
14.
go back to reference Wache, H., Vögele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H., Hübner, S.: Ontology-based integration of information - a survey of existing approaches. In: IJCAI-01 Workshop: Ontologies and Information Sharing, vol. 2001 (2001) Wache, H., Vögele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H., Hübner, S.: Ontology-based integration of information - a survey of existing approaches. In: IJCAI-01 Workshop: Ontologies and Information Sharing, vol. 2001 (2001)
15.
go back to reference Tsung-Yi, C.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)CrossRef Tsung-Yi, C.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)CrossRef
16.
go back to reference Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, pp. 38–47. IEEE Computer (1996) Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, pp. 38–47. IEEE Computer (1996)
17.
go back to reference Halboob, W., Mahmod, R., S. Algathbar, K., Mamat, A.: TC-enabled and distributed cloud computing access control model. J. Appl. Sci. 14(7), 620–630 (2014)CrossRef Halboob, W., Mahmod, R., S. Algathbar, K., Mamat, A.: TC-enabled and distributed cloud computing access control model. J. Appl. Sci. 14(7), 620–630 (2014)CrossRef
Metadata
Title
Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms
Authors
Abed Alshreef
Lin Li
Wahid Rajeh
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_11