Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523514.2527005acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Designing flexible access control models for the cloud

Published: 26 November 2013 Publication History
  • Get Citation Alerts
  • Abstract

    In Cloud environments, Cloud users have the possibility to put their sensitive data on Cloud servers, which opens the door to security challenges concerning data protection. In this context, access control is of vital importance, since it provides security mechanisms to protect against inappropriate access to data. Unfortunately, classical access control models such as DAC, MAC, RBAC or ABAC are not sufficiently expressive for highly flexible and dynamic environments such as those found in the Cloud. Often, a combination of elements of these models is necessary in order to properly express varied data protection needs. In this paper, we present a new approach called CatBAC (Category Based Access Control), for building dedicated access control models starting from an abstract meta-model. Hence, in our approach, a meta-model can be refined in accordance with the high level security policies of each specific user. Our framework for building access control models can be implemented as a Cloud service and Cloud providers will then apply different concrete access control models produced by each user to process its incoming access requests.

    References

    [1]
    A. Abou-El-Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization based access control. In Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pages 120--131, 2003.
    [2]
    B. Aziz, A. Arenas, and M. Wilson. Model-Based Refinement of Security Policies in Collaborative Virtual Organisations, volume 6542 of Lecture Notes in Computer Science, pages 1--14. Springer Berlin / Heidelberg, 2011.
    [3]
    S. Barker. The next 700 access control models or a unifying meta-model? In Proceedings of the 14th ACM symposium on Access control models and technologies, pages 187--196, 1542238, 2009. ACM.
    [4]
    S. Barker. Logical Approaches to Authorization Policies, volume 7360 of Lecture Notes in Computer Science, pages 349--373. Springer Berlin / Heidelberg, 2012.
    [5]
    D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From uml models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1): 39--91, 2006.
    [6]
    Y. Bouzida, L. Logrippo, and S. Mankovski. Concrete- and abstract-based access control. Int. J. Inf. Secur., 10(4): 223--238, 2011.
    [7]
    R. Buyya, Y. Chee Shin, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In High Performance Computing and Communications, 2008. HPCC '08. 10th IEEE International Conference on, pages 5--13, 2008.
    [8]
    M. Carvalho. Secaas-security as a service. ISSA Journal, pages 20--24, 2011.
    [9]
    N. Correa and R. Giandini. A uml extension to specify model refinements. In CLEI 2006, 2006.
    [10]
    D. Ferraiolo and D. Kuhn. Role-based access control. In 15th Nat'l Computer Security Conf., pages 554--563, 1992.
    [11]
    S. Khamadja, K. Adi, and L. Logrippo. An access control framework for hybrid policies. In Security of Information and Networks, 2013. SIN '13. The 6th International Conference on, 2013.
    [12]
    R. L. Krutz and R. D. Vines. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. John Wiley & Sons, 2010.
    [13]
    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303--314, 1998.
    [14]
    Y.-G. Min, H.-J. Shin, and Y.-H. Bang. Cloud computing security issues and access control solutions. SERSC: Journal of Security Engineering, 9: 135--142, 2012.
    [15]
    P. Mirchandani. Security-as-a-service - the next growth area for cloud computing?, Oct 26 2009.
    [16]
    J. D. Moffett and M. S. Sloman. Policy hierarchies for distributed systems management. IEEE J. Sel. A. Commun., 11(9): 1404--1414, 2006.
    [17]
    H. A. J. Narayanan and M. H. Gunes. Ensuring access control in cloud provisioned healthcare systems. In Consumer Communications and Networking Conference (CCNC), 2011 IEEE, pages 247--251, 2011.
    [18]
    OMG. Object management group. object constraint language, version 2.2, 2010. omg document number: formal/2010-02-01.
    [19]
    J. A. Pavlich-Mariscal, S. A. Demurjian, and L. D. Michel. A framework of composable access control features: Preserving separation of access control concerns from models to code. Computers & Security, 29(3): 350--379, 2010.
    [20]
    I. Ray, N. Li, D.-K. Kim, and R. France. Using Parameterized UML to Specify and Compose Access Control Models, volume 140 of IFIP International Federation for Information Processing, pages 49--65. Springer Boston, 2004.
    [21]
    L. Shi-Xin, L. Feng-Mei, and R. Chuan-Lun. A hierarchy attribute-based access control model for cloud storage. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, volume 3, pages 1146--1150, 2011.
    [22]
    N. Slimani, H. Khambhammettu, K. Adi, and L. Logrippo. Uacml: Unified access control modeling language. In New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, pages 1--8, 2011.
    [23]
    L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 45--55, 1029140, 2004. ACM.

    Cited By

    View all
    • (2024)Access Control Solutions in Electronic Health Record Systems: A Systematic ReviewInformatics in Medicine Unlocked10.1016/j.imu.2024.101552(101552)Online publication date: Jul-2024
    • (2022)HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New OpportunitiesJournal of Cybersecurity and Privacy10.3390/jcp20100042:1(42-64)Online publication date: 14-Feb-2022
    • (2022)Systematic analysis of software development in cloud computing perceptionsJournal of Software: Evolution and Process10.1002/smr.2485Online publication date: 29-Jun-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
    November 2013
    483 pages
    ISBN:9781450324984
    DOI:10.1145/2523514
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    • Macquarie U., Austarlia
    • MNIT: Malaviya National Institute of Technology
    • Aksaray Univ.: Aksaray University
    • SFedU: Southern Federal University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CatBAC
    2. access control models
    3. cloud computing
    4. hybrid policies
    5. meta-model
    6. refinement

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SIN '13
    Sponsor:
    • MNIT
    • Aksaray Univ.
    • SFedU

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Access Control Solutions in Electronic Health Record Systems: A Systematic ReviewInformatics in Medicine Unlocked10.1016/j.imu.2024.101552(101552)Online publication date: Jul-2024
    • (2022)HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New OpportunitiesJournal of Cybersecurity and Privacy10.3390/jcp20100042:1(42-64)Online publication date: 14-Feb-2022
    • (2022)Systematic analysis of software development in cloud computing perceptionsJournal of Software: Evolution and Process10.1002/smr.2485Online publication date: 29-Jun-2022
    • (2021)Access Control Metamodel for Policy Specification and Enforcement: From Conception to FormalizationProcedia Computer Science10.1016/j.procs.2021.03.111184(887-892)Online publication date: 2021
    • (2021)A Review of Access Control MetamodelsProcedia Computer Science10.1016/j.procs.2021.03.056184(445-452)Online publication date: 2021
    • (2020)Deriving Access Control Models based on Generic and Dynamic Metamodel Architecture: Industrial Use CaseProcedia Computer Science10.1016/j.procs.2020.10.024177(162-169)Online publication date: 2020
    • (2016)Assessment and Authorization in Private Cloud SecuritySecurity in the Private Cloud10.1201/9781315372211-18(271-285)Online publication date: 12-Oct-2016
    • (2016)Knowledge Based Security Model for Banking in CloudProceedings of the International Conference on Informatics and Analytics10.1145/2980258.2980364(1-6)Online publication date: 25-Aug-2016
    • (2016)Infrastructure as a service: Exploring network access control challenges2016 SAI Computing Conference (SAI)10.1109/SAI.2016.7556042(596-603)Online publication date: Jul-2016
    • (2016)EACF: extensible access control framework for cloud environmentsAnnals of Telecommunications10.1007/s12243-016-0548-172:5-6(307-323)Online publication date: 21-Nov-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media