Advertisement

A Novel Access Control for Cloud Services Using Trust Based Design

  • Manikonda AparnaEmail author
  • N. Nalini
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)

Abstract

In recent years the progress of cloud computing has become a complex system with diverse set of services and its user requirements. Access control plays a crucial role for accessing these services and assets of an organization via cloud servers. In, this paper we presented a novel access control technique known as Trust-RBAC which is based on non-security-oriented trust that provides a new dimension to prevent from unauthorized access to the cloud resources. To prove the efficiency of our approach, extensive simulations are been carried out in a cloud environment to show its effectiveness in controlling the malicious requests to the resources.

Keywords

Access control RBAC Trust-RBAC CloudSim 

References

  1. 1.
    Younis Y, et al.: An access control model for cloud computing. J. Inf. Secur. Appl. (2014). http://dx.doi.org/10.1016/j.jisa.2014.04.003
  2. 2.
    Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 97–102 (2011)Google Scholar
  3. 3.
    Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)CrossRefGoogle Scholar
  4. 4.
    Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., Tang, L., Tang, Y.: Fine-grained data access control systems with user accountability in cloud computing. In: Proceedings of 2nd IEEE International Conference on Cloud Computing Technology and Science. IEEE Computer Society (2010)Google Scholar
  5. 5.
    Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563 (2012)Google Scholar
  6. 6.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 2006, Alexandria, Virginia, USA, 30 October–3 November 2006 (2006)Google Scholar
  7. 7.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, Washington, DC, USA, pp. 321–334 (2007)Google Scholar
  8. 8.
    Andal Jayaprakash, H., Hadi Gunes, M.: Ensuring access control in cloud provisioned healthcare systems. In: Consumer Communications and Networking Conference (CCNC), pp. 247–251. IEEE (2011)Google Scholar
  9. 9.
    Tsai, W.-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 10th International Symposium on Autonomous Decentralized Systems (ISADS), pp. 121–128 (2011)Google Scholar
  10. 10.
    Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, pp. 447–451. IEEE (2011)Google Scholar
  11. 11.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service, pp. 1–9. IEEE (2009)Google Scholar
  12. 12.
    Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. IEEE (2011)Google Scholar
  13. 13.
    Blaze, M., Feigenbaum, J. and Keromytis, A.D.: KeyNote: trust management for public-key infrastructures. In: Christianaon, B., Crispo, B., Willian, S., et al. (eds.) Cambridge 1998 Security Protocols International Workshop. Spirnger, Berlin (1998)Google Scholar
  14. 14.
    Pearson, S., Mont, M.C., Crane, S.: Persistent and dynamic trust: analysis and the related impact of trusted platforms. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Trust Management, Proceedings, iTrust 2005, LNCS, vol. 3477, pp. 355–363 (2005)Google Scholar
  15. 15.
    Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Comput. 12(4), 55–59 (2008)CrossRefGoogle Scholar
  16. 16.
    Singh, S., Morley, C.: Young Australians’ privacy, security and trust in internet banking. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human interaction Special interest Group: Design: Open 24/7 (2009)Google Scholar
  17. 17.
    Goyal, T., Singh, A., Agrawal, A.: Cloudsim: simulator for cloud computing infrastructure and modeling. In: International Conference on Modelling Optimization and Computing, vol. 38, pp.3566–3572 (2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.VTUBangaloreIndia
  2. 2.Department of CSENMITBangaloreIndia

Personalised recommendations