Skip to main content

Taxonomy and Classification of Access Control Models for Cloud Environments

  • Chapter
  • First Online:
Continued Rise of the Cloud

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Cloud computing is an emerging and highly attractive technology due to its inherent efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But alongside these advantages, many new problems have also surfaced and some of these issues have become a cause of grave concern. One of the existing problems that have become critical in the cloud environment is the issue of access control and security. Access control refers to a policy that authenticates a user and permits the authorized user to access data and other resources of cloud-based systems. In access control, there are several restrictions and rules that need to be followed by the users before they can access any kind of data or resource from the cloud-based servers. In this context, there are many access control models suggested by researchers that currently exist. In this chapter, a brief discussion of the various access control models has been presented. Moreover, the taxonomy of access control schemes has also been introduced. Finally, based on the analysis of the mechanisms adapted therein, the access control models are classified into different classes of the proposed taxonomy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM T Inf Sys Secur 9(1):1–30

    Article  MATH  Google Scholar 

  2. Ausanka-Crues R (2006) Methods for access control: advances and limitations. http://www.cs.hmc.edu/~mike/public_html/courses/security/s06/projects/ryan.pdf. Accessed 9 Oct 2013

  3. Baldwin RW (1990) Naming and grouping privileges to simplify security management in large databases. In: Proceedings of the IEEE computer society symposium on research in security and privacy, pp 116–132, Oakland, USA, May 1990

    Google Scholar 

  4. Bell DE, Padula LJL (March 1976) Secure computer system: unified exposition and multics interpretation (Mitre Corporation). http://www.dtic.mil/dtic/tr/fulltext/u2/a023588.pdf. Accessed 7 Oct 2013

  5. Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control model. ACM T Inf Syst Secur 4(3):191–233

    Article  Google Scholar 

  6. Bertino E, Carminati B, Ferrari E (2002) A temporal key management scheme for secure broadcasting of XML documents. In: Proceedings of 9th ACM conference on computer and communications security, pp 31–40, Washington, DC, USA, Nov 2002

    Google Scholar 

  7. Bertino E, Byun JW, Li N (2005) Privacy-preserving database systems. In: Aldini A, Gorrieri R, Martinelli F (eds) Foundations of security analysis and design III. Springer, Berlin, pp 178–206

    Chapter  Google Scholar 

  8. Bishop M (2002) Computer security: art and science, Addison-Wesley, Boston

    Google Scholar 

  9. Byun J W, Bertino E, Li Ninghui (2005) Purpose based access control of complex data for privacy protection. In: Proceedings of 10th ACM symposium on access control models and technologies, pp 102–110, Stockholm, Sweden, June 2005

    Google Scholar 

  10. Clark DD, Wilson DR (1987) A comparison of commercial and military computer security policies. In: Proceedings of IEEE symposium on computer security and privacy, pp 184–194, Oakland, USA, April 1987

    Google Scholar 

  11. Danwei C, Xiuli H, Xunyi R (2009) Access control of cloud service based on UCON. Proceedings of CloudCom, pp 559–564, Beijing, China, Dec 2009

    Google Scholar 

  12. Fabry RS (1974) Capability-based addressing. Commun ACM 17(7):403–412

    Article  Google Scholar 

  13. Federal Information Processing Standards (1994) Security requirements for cryptographic modules. http://www.itl.nist.gov/fipspubs/fip140-1.htm. Accessed 6 Oct 2013

  14. Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In: Proceedings of the 15th national computer security conference, pp 554–563, Baltimore, USA, Oct 1992

    Google Scholar 

  15. Gao X, Jiang Z, Jiang R (2012) A novel data access scheme in cloud computing. In: Proceedings of the 2nd international conference on computer and information applications, pp 124–127, Taiyuan, Chaina, Dec 2012

    Google Scholar 

  16. Hota C, Sankar S, Rajarajan M, Nair SK (2011) Capability-based cryptographic data access control in cloud computing. Int J Adv Netw Appl 3(03):1152–1161

    Google Scholar 

  17. Jiyi W, Qianli S, Jianlin Z, Qi X (2011) Cloud computing: cloud security to trusted cloud. Adv Mater Res 186:596–600

    Article  Google Scholar 

  18. Kalam AAE, Baida RE, Balbiani P, Benferhat S (2003) Organization based access control. In: Proceedings of the 4th IEEE international workshop on policies for distributed systems and networks, pp 120–131, Lake Como, Italy, June 2003

    Google Scholar 

  19. Khan AR (2012) Access control in cloud computing environment. ARPN J Eng Appl Sci 7(5):1819–6608

    Google Scholar 

  20. Khan KM, Malluhi Q (2010) Establishing trust in cloud computing. IT Prof 12(5):20–27

    Article  Google Scholar 

  21. Lampson BW (1971), Protection. In: Proceedings of 5th Princeton symposium on information science and systems, pp 437–443, Princeton University, USA, March 1971 (reprinted in Oper Syst Rev 8(1):18–24, Jan 1974)

    Google Scholar 

  22. Mayfield T, Roskos JE, Welke SR, Boone JM (1991) Integrity in automated information systems (Institute for Defence Analysis). http://www.csirt.org/color_%20books/C-TR-79-91.pdf. Accessed 4 Oct 2013

  23. Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the 7th ACM symposium on access control models and technologies, pp. 57–64, Monterey, USA, June 2002

    Google Scholar 

  24. Park J, Sandhu R (2004) The UCONABC usage control model. ACM T Inf Syst Secur 7(1):128–174

    Article  Google Scholar 

  25. Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: Proceedings of the 33rd international convention on information and communication technology, electronics and microelectronics, pp 344–349, Opatija, Croatia, May 2010

    Google Scholar 

  26. Pries R, Yu W, Fu X, Zhao W (2008) A new replay attack against anonymous communication networks. In: Proc IEEE international conference on communication, pp 1578–1582, Beijing, China, May 2008

    Google Scholar 

  27. Saidi MB, Elkalam AA, Marzouk A (2012) TOrBAC: a trust organization based access control model for cloud computing systems. Int J Soft Comput Eng 2(4):122–130

    Google Scholar 

  28. Sandhu R, Ferraiolo D, Kuhn R (2000) The NIST model for role based access control: toward a unified standard. In: Proceedings of the 5th ACM workshop on role based access control, pp 47–63, Berlin, Germany, July 2000

    Google Scholar 

  29. Sanka S, Hota C, Rajarajan M (2010) Secure data access in cloud computing. In: Proceeding 4th international conference on internet multimedia systems architectures and applications, pp 1–6, Bangalore, India, Dec 2010

    Google Scholar 

  30. Sasaki T, Nakae M, Ogawa R (2010) Content oriented virtual domains for secure information sharing across organizations. In: Proceedings of the ACM workshop on cloud computing security, pp 7–12, Chicago, USA, 2010

    Google Scholar 

  31. Singh P, Singh S (2013) A new advance efficient RBAC to enhance the security in cloud computing. Int J Adv Res Comput Sci Softw Eng 3(6):1136–1142

    Google Scholar 

  32. Somorovsky J, Mayer A, Schwenk J, Kampmann M, Jensen M (2012) On breaking SAML: be whoever you want to be. In: Proceedings of the 21st USENIX conference on security symposium, pp 21–21, Bellevue, WA, Aug 2012

    Google Scholar 

  33. Sun L, Li Y (2006) DTD level authorization in XML documents with usage control. Int J Comput Sci Netw Secur 6(11):244–250

    Google Scholar 

  34. Sun L, Wang H (2010) A purpose based usage access control model. Int J Comput Inf Eng 4(1):44–51

    Google Scholar 

  35. Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007a) Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd international conference on very large databases, pp 123–134, Vienna, Austria, Sept 2007

    Google Scholar 

  36. Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007b) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the ACM workshop on computer security architecture, pp 63–69, Alexandria, USA, Oct 2007

    Google Scholar 

  37. Wang W, Li Z, Owens R, Bhargava B (2009) Secure and efficient access to outsourced data. In: Proceedings of the ACM cloud computing security workshop, pp 55–65, Chicago, USA, Nov 2009

    Google Scholar 

  38. Wu Y, Suhendra V, Guo H (2012) A gateway-based access control scheme for collaborative clouds. In: Wagner A (ed) Seventh International Conference on Internet Monitoring and Protection, Stuttgart, Germany, June 2012. Red Hook, Curran Associates, pp. 54–60

    Google Scholar 

  39. Xu J, Yan J, He L, Su P, Feng D (2010) CloudSEC: a cloud architecture for composing collaborative security services. In: Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, pp 703–711, Indiana, USA, Dec 2010

    Google Scholar 

  40. Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: Proceedings of the grid computing environments workshop, pp 1–10, Austin, USA, Nov 2008

    Google Scholar 

  41. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the IEEE INFOCOM, pp 1–9, San Diego, USA, March 2010

    Google Scholar 

  42. Zargar ST, Hassan T, Joshi JBD (2011) DCDIDP: a distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In: Proceedings of the 7th international conference on collaborative computing: networking, applications and worksharing (collaborateCom), pp 332–341, Orlando, USA, Oct 2011

    Google Scholar 

  43. Zhu Y, Hu H, Ahn GJ, Huang D (2012) Towards temporal access control in cloud computing. In: Proceedings of IEEE INFOCOM, pp 2576–2580, Orlando, USA, March 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Majumder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Majumder, A., Namasudra, S., Nath, S. (2014). Taxonomy and Classification of Access Control Models for Cloud Environments. In: Mahmood, Z. (eds) Continued Rise of the Cloud. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6452-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6452-4_2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6451-7

  • Online ISBN: 978-1-4471-6452-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics