Skip to main content

Enhanced Role-Based Access Control for Cloud Security

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

There has been significant work done on access control previously. The proposed access control system is aiming at providing more security to enterprise resource on cloud by limiting the access of resources. Each enterprise has a different hierarchical structure based on their organizational policy. This organizational hierarchy is built using various roles that are interdependent on each other. Therefore, instead of defining the access policy for each user, the system defines access for each role. There are many standards which are available for access control such as XACML and SAML. The proposed system uses the concept of XACML for designing the policies. In addition to this feature, the system has a role request module that enables the user to hold other roles as well. This project provides a security solution via RBAC system for cloud security (RBACcs) to improve the security of data on cloud. This paper shows how the existing security standards such as XACML can be used to create and manage the policies of RBACcs. These policies are defined and designed according to current business scenario. The paper also studies the existing work done on cloud security and gives a comparative study between the proposed and the existing systems. In the end, we also proposed a few extensions to the existing system that can be made based on the security needs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. [Paperback] T. Mather, S. Kumaraswamy, S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance (Theory in Practice)

    Google Scholar 

  2. S. Misra, P. Venkata Krishna, V. Saritha, H. Agarwal, L. Shu, M.S. Obaidat, Efficient medium access control for cyber physical systems with heterogeneous networks. IEEE Syst. J. (2013)

    Google Scholar 

  3. R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline. In ACM Workshop on Role-Based Access Control (1997), pp. 41–50

    Google Scholar 

  4. R. Sandhu, D. Ferraiolo, D. Richard Kuhn, The NIST model for role-based access control: towards a unified standard. In ACM Workshop on Role-Based Access Control, (2000), pp. 47–63

    Google Scholar 

  5. EE. Mon, TT. Naing, The privacy-aware access control system using attribute-and role-based access control in private cloud. In 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), vol. 28(30) (2011), pp. 447–451

    Google Scholar 

  6. Z. Tianyi, L. Weidong, S. Jiaxing, An efficient role based access control system for cloud computing. In CIT (2011), pp. 97–102

    Google Scholar 

  7. M. Raykova, H. Zhao, S.M. Bellovin, Privacy enhanced access control for outsourced data sharing. In Financial Cryptography (2012), pp. 223–238

    Google Scholar 

  8. W. Li, H. Wan, X. Ren, S. Li, A refined RBAC model for cloud computing. In ACIS-ICIS (2012), pp. 43–48

    Google Scholar 

  9. A.L. Pereira, RBAC for high performance computing systems integration in grid computing and cloud computing. In IPDPS Workshops (2011), pp. 914–921

    Google Scholar 

  10. S. Godik, T. Moses, Oasis extensible access control markup language (xacml) version 1.1. Oasis committee specification (2003)

    Google Scholar 

  11. S.T. Vinter, Extended discretionary access controls. In IEEE Symposium on Security and Privacy, (1988), pp. 39–49

    Google Scholar 

  12. W.T. Tsai, Q. Shao, Role-based access-control using reference ontology in clouds. In ISADS (2011), pp. 121–128

    Google Scholar 

  13. M.R. Sadasivan, M.K. Sangeetha, S. Karthik, A survey on access control of cloud data. IJARCET 1(8) (2012)

    Google Scholar 

  14. V. Suhendra, A survey on access control deployment. In FGIT-SecTech (2011), pp. 11–20

    Google Scholar 

  15. S.L. Reeja, Role based access control mechanism in cloud computing using co-operative secondary authorization recycling method (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Balamurugan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Balamurugan, B., Venkata Krishna, P. (2015). Enhanced Role-Based Access Control for Cloud Security. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_89

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_89

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics