Skip to main content

Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing

  • Conference paper
Networked Digital Technologies (NDT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 87))

Included in the following conference series:

Abstract

Cloud computing is emerging as a virtual model in support of “everything-as-a-service” (XaaS). There are numerous providers such as feeders, owners and creators who are less likely the same actor, and multiple platforms possibly with different security control mechanisms. Consequently, cloud resources cannot be securely managed by traditional access control models. In this paper, we propose a new security technique to enable a multifactor access control, and to cope with various deployment models where user’s network and system sessions may vary. Using the metadata of resources and access policies, the technique builds the privilege chains. The contribution of this paper includes a mechanism of the privilege chains that can be used to verify the trustiness of cloud resources and to protect the resources from unauthorized access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ben Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: Managing Delegation in Access Control Models. IEEE ADCOM (2007)

    Google Scholar 

  2. Blezard, D., Marceau, J.: One user, one password: integrating Unix accounts and active directory. In: ACM Conf. on SIGUCCS (2002)

    Google Scholar 

  3. Cudre-Mauroux, P., Budura, A., Hauswirth, M., Aberer, K.: PicShark: mitigating metadata scarcity through large-scale P2P collaboration. VLDB Journal 17 (2008)

    Google Scholar 

  4. Security Guidance for Critical Areas of Focus in Cloud Computing, v.2.1, Cloud Security Alliance (2009), http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf

  5. Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud security is not (just) virtualization security. In: ACM Cloud Computing Security Workshop (2009)

    Google Scholar 

  6. Damiani, M., Martin, H., Saygin, Y., Spada, M., Ulmer, C.: Spatio-temporal Access Control: Challenges and Applications. In: ACM SACMAT (2009)

    Google Scholar 

  7. Ferraiolo, D., Atluri, V.: A meta model for access control: why is it needed and is it even possible to achieve? In: ACM SACMAT (2008)

    Google Scholar 

  8. Ferraiolo, D., Kuhn, D., Sandhu, R.: RBAC Standard rationale: comments on a critique of the ANSI standard on Role-Based Access Control. IEEE Security & Privacy 5 (2007)

    Google Scholar 

  9. Haslhofer, B., Klas, W.: A survey of techniques for achieving metadata interoperability. ACM Computing Surveys 42 (2010)

    Google Scholar 

  10. Joshi, J., Bertino, E.: Fine-grained role-based delegation in presence of the hybrid role hierarchy. In: ACM SACMAT (2006)

    Google Scholar 

  11. Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: ACM SACMAT (2008)

    Google Scholar 

  12. Hao, F., Lakshman, T., Mukherjee, S., Song, H.: Enhancing dynamic cloud-based services using network virtualization. ACM SIGCOMM Computer Communication Review 40 (2010)

    Google Scholar 

  13. Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s Inside the Cloud? An Architectural Map of the Cloud Landscape. In: IEEE Conf. on CLOUD (2009)

    Google Scholar 

  14. Lee, A., Winslett, M., Basney, J., Welch, V.: Traust: a trust negotiation-based authorization service for open systems. In: ACM SACMAT (2006)

    Google Scholar 

  15. Pereira, F.: MPEG multimedia standards: evolution and future developments. In: ACM MULTIMEDIA (2007)

    Google Scholar 

  16. Raj, H., Nathuji, R., Singh, A., England, P.: Resource management for isolation enhanced Cloud services. In: ACM CCSW (2009)

    Google Scholar 

  17. Vaquero, L., Rodero-Merino, L., Caceres, J., Lindner, M.: A greak in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review 39(1) (2008)

    Google Scholar 

  18. Wang, H., Osborn, S.: Discretionary access control with the administrative role graph model. In: ACM SACMAT (2007)

    Google Scholar 

  19. Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on Cloud storage architecture and key technologies. In: ICIS (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, J.P., Chen, Z. (2010). Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14292-5_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14291-8

  • Online ISBN: 978-3-642-14292-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics