Skip to main content

Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment

  • Chapter
  • First Online:
Advanced Computing and Systems for Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 667))

  • 299 Accesses

Abstract

Advancement in distributed computing and Internet-based computing, like cloud, has put high concerns on security issues. Identity and access management is one such issue that requires urgent attention. Both data privacy and user privacy need to be protected in privacy-aware cloud computing applications. Anonymous user interaction helps users to privately interact with any system. It must be made sure that unauthorized entity should not get access to data resources. Hence, identity credentials may not always be enough. Different contexts like user role, trust, behavior may be considered as an identity context required to authenticate the user for an active session. In any privacy-aware system, a wrong interaction might provide improper data access. Therefore, dynamic decision-making may also be required for a proper access session to continue. Quasi-static authorization models consider reauthorization at regular intervals. At the end of each interval, the user is again verified against his various contexts if the resource access is to be continued. Many research works focus on fine-grained access control model in highly dynamic environments. However, handling the contexts is the main concern in these types of access model. In this chapter, we propose an access model with the concept of delta authorization with an easy user session out process. Here, authorization not only proceeds at delta intervals, but also considers contextual information besides usual credentials. This technique is able to handle fine-grained access control in a better way. An implementation with the analysis is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dos Santos, D.R., et al.: Risk-based dynamic access control for a highly scalable cloud federation. In: Proceedings of the Seventh International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2013)

    Google Scholar 

  2. Maa, S., et al.: A trust-based dynamic access control model (2010)

    Google Scholar 

  3. Dmitrienko, A., et al.: On the (in) security of mobile two-factor authentication. Financial Cryptography and Data Security, pp. 365–383. Springer, Berlin, Heidelberg (2014)

    Google Scholar 

  4. Desmedt, Y.: Man-in-the-middle attack. Encyclopedia of cryptography and security, pp. 759–759. Springer, US (2011)

    Google Scholar 

  5. Demchenko, Y., et al.: Web services and grid security vulnerabilities and threats analysis and model. In: Proceedings of the 6th IEEE/ACM international workshop on grid computing. IEEE Computer Society (2005)

    Google Scholar 

  6. Kim, J., Hong, S.-P.: A method of risk assessment for multi-factor authentication. J. Inf. Process. Syst. 7(1), 187–198 (2011)

    Google Scholar 

  7. Kathrine, G.J.W., Kirubakaran, E.: Biometric authentication and authorization system for grid security. Int. J. Hybrid Inform. Technol. 4(4), 43–58 (2011)

    Google Scholar 

  8. Tigli, J.-Y., et al.: Context-aware authorization in highly dynamic environments. arXiv preprint arXiv:1102.5194 (2011)

  9. Ullah, S., Xuefeng, Z., Feng, Z.: TCloud: a dynamic framework and policies for access control across multiple domains in cloud computing. arXiv preprint arXiv:1305.2865 (2013)

  10. Sprinkle, J., Eames, B.: Time-triggered buffers for event-based middleware systems. In: Elissa, K. (ed.) Innovat. Syst. Softw. Eng. 7(1), 9–22. Unpublished (2011)

    Google Scholar 

  11. Albert, A.: Comparison of event-triggered and time-triggered concepts with regard to distributed control systems. Embed. World 2004, 235–252 (2004)

    Google Scholar 

  12. Cuppens, F., Mige, A.: Modelling contexts in the Or-BAC model. Computer Security Applications Conference, 2003. In: Proceedings 19th Annual IEEE, I.S. (2003)

    Google Scholar 

Download references

Acknowledgements

This publication is an outcome of the R&D work undertaken in the ITRA project of Media Lab Asia entitled “Remote Health: A Framework for Healthcare Services using Mobile and Sensor-Cloud Technologies”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayantani Saha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Saha, S., Das, R., Neogy, S. (2018). Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 667. Springer, Singapore. https://doi.org/10.1007/978-981-10-8183-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8183-5_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8182-8

  • Online ISBN: 978-981-10-8183-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics