Abstract
In recent years the progress of cloud computing has become a complex system with diverse set of services and its user requirements. Access control plays a crucial role for accessing these services and assets of an organization via cloud servers. In, this paper we presented a novel access control technique known as Trust-RBAC which is based on non-security-oriented trust that provides a new dimension to prevent from unauthorized access to the cloud resources. To prove the efficiency of our approach, extensive simulations are been carried out in a cloud environment to show its effectiveness in controlling the malicious requests to the resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Younis Y, et al.: An access control model for cloud computing. J. Inf. Secur. Appl. (2014). http://dx.doi.org/10.1016/j.jisa.2014.04.003
Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 97–102 (2011)
Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)
Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., Tang, L., Tang, Y.: Fine-grained data access control systems with user accountability in cloud computing. In: Proceedings of 2nd IEEE International Conference on Cloud Computing Technology and Science. IEEE Computer Society (2010)
Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563 (2012)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 2006, Alexandria, Virginia, USA, 30 October–3 November 2006 (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, Washington, DC, USA, pp. 321–334 (2007)
Andal Jayaprakash, H., Hadi Gunes, M.: Ensuring access control in cloud provisioned healthcare systems. In: Consumer Communications and Networking Conference (CCNC), pp. 247–251. IEEE (2011)
Tsai, W.-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 10th International Symposium on Autonomous Decentralized Systems (ISADS), pp. 121–128 (2011)
Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, pp. 447–451. IEEE (2011)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service, pp. 1–9. IEEE (2009)
Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. IEEE (2011)
Blaze, M., Feigenbaum, J. and Keromytis, A.D.: KeyNote: trust management for public-key infrastructures. In: Christianaon, B., Crispo, B., Willian, S., et al. (eds.) Cambridge 1998 Security Protocols International Workshop. Spirnger, Berlin (1998)
Pearson, S., Mont, M.C., Crane, S.: Persistent and dynamic trust: analysis and the related impact of trusted platforms. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Trust Management, Proceedings, iTrust 2005, LNCS, vol. 3477, pp. 355–363 (2005)
Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Comput. 12(4), 55–59 (2008)
Singh, S., Morley, C.: Young Australians’ privacy, security and trust in internet banking. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human interaction Special interest Group: Design: Open 24/7 (2009)
Goyal, T., Singh, A., Agrawal, A.: Cloudsim: simulator for cloud computing infrastructure and modeling. In: International Conference on Modelling Optimization and Computing, vol. 38, pp.3566–3572 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Aparna, M., Nalini, N. (2020). A Novel Access Control for Cloud Services Using Trust Based Design. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_76
Download citation
DOI: https://doi.org/10.1007/978-3-030-33846-6_76
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33845-9
Online ISBN: 978-3-030-33846-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)