Skip to main content

A Novel Access Control for Cloud Services Using Trust Based Design

  • Conference paper
  • First Online:
Book cover Inventive Computation Technologies (ICICIT 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 98))

Included in the following conference series:

  • 866 Accesses

Abstract

In recent years the progress of cloud computing has become a complex system with diverse set of services and its user requirements. Access control plays a crucial role for accessing these services and assets of an organization via cloud servers. In, this paper we presented a novel access control technique known as Trust-RBAC which is based on non-security-oriented trust that provides a new dimension to prevent from unauthorized access to the cloud resources. To prove the efficiency of our approach, extensive simulations are been carried out in a cloud environment to show its effectiveness in controlling the malicious requests to the resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Younis Y, et al.: An access control model for cloud computing. J. Inf. Secur. Appl. (2014). http://dx.doi.org/10.1016/j.jisa.2014.04.003

  2. Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 97–102 (2011)

    Google Scholar 

  3. Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)

    Article  Google Scholar 

  4. Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., Tang, L., Tang, Y.: Fine-grained data access control systems with user accountability in cloud computing. In: Proceedings of 2nd IEEE International Conference on Cloud Computing Technology and Science. IEEE Computer Society (2010)

    Google Scholar 

  5. Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563 (2012)

    Google Scholar 

  6. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 2006, Alexandria, Virginia, USA, 30 October–3 November 2006 (2006)

    Google Scholar 

  7. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, Washington, DC, USA, pp. 321–334 (2007)

    Google Scholar 

  8. Andal Jayaprakash, H., Hadi Gunes, M.: Ensuring access control in cloud provisioned healthcare systems. In: Consumer Communications and Networking Conference (CCNC), pp. 247–251. IEEE (2011)

    Google Scholar 

  9. Tsai, W.-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 10th International Symposium on Autonomous Decentralized Systems (ISADS), pp. 121–128 (2011)

    Google Scholar 

  10. Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, pp. 447–451. IEEE (2011)

    Google Scholar 

  11. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service, pp. 1–9. IEEE (2009)

    Google Scholar 

  12. Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. IEEE (2011)

    Google Scholar 

  13. Blaze, M., Feigenbaum, J. and Keromytis, A.D.: KeyNote: trust management for public-key infrastructures. In: Christianaon, B., Crispo, B., Willian, S., et al. (eds.) Cambridge 1998 Security Protocols International Workshop. Spirnger, Berlin (1998)

    Google Scholar 

  14. Pearson, S., Mont, M.C., Crane, S.: Persistent and dynamic trust: analysis and the related impact of trusted platforms. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Trust Management, Proceedings, iTrust 2005, LNCS, vol. 3477, pp. 355–363 (2005)

    Google Scholar 

  15. Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Comput. 12(4), 55–59 (2008)

    Article  Google Scholar 

  16. Singh, S., Morley, C.: Young Australians’ privacy, security and trust in internet banking. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human interaction Special interest Group: Design: Open 24/7 (2009)

    Google Scholar 

  17. Goyal, T., Singh, A., Agrawal, A.: Cloudsim: simulator for cloud computing infrastructure and modeling. In: International Conference on Modelling Optimization and Computing, vol. 38, pp.3566–3572 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manikonda Aparna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aparna, M., Nalini, N. (2020). A Novel Access Control for Cloud Services Using Trust Based Design. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_76

Download citation

Publish with us

Policies and ethics