Abstract
There has been significant work done on access control previously. The proposed access control system is aiming at providing more security to enterprise resource on cloud by limiting the access of resources. Each enterprise has a different hierarchical structure based on their organizational policy. This organizational hierarchy is built using various roles that are interdependent on each other. Therefore, instead of defining the access policy for each user, the system defines access for each role. There are many standards which are available for access control such as XACML and SAML. The proposed system uses the concept of XACML for designing the policies. In addition to this feature, the system has a role request module that enables the user to hold other roles as well. This project provides a security solution via RBAC system for cloud security (RBACcs) to improve the security of data on cloud. This paper shows how the existing security standards such as XACML can be used to create and manage the policies of RBACcs. These policies are defined and designed according to current business scenario. The paper also studies the existing work done on cloud security and gives a comparative study between the proposed and the existing systems. In the end, we also proposed a few extensions to the existing system that can be made based on the security needs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
[Paperback] T. Mather, S. Kumaraswamy, S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance (Theory in Practice)
S. Misra, P. Venkata Krishna, V. Saritha, H. Agarwal, L. Shu, M.S. Obaidat, Efficient medium access control for cyber physical systems with heterogeneous networks. IEEE Syst. J. (2013)
R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline. In ACM Workshop on Role-Based Access Control (1997), pp. 41–50
R. Sandhu, D. Ferraiolo, D. Richard Kuhn, The NIST model for role-based access control: towards a unified standard. In ACM Workshop on Role-Based Access Control, (2000), pp. 47–63
EE. Mon, TT. Naing, The privacy-aware access control system using attribute-and role-based access control in private cloud. In 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), vol. 28(30) (2011), pp. 447–451
Z. Tianyi, L. Weidong, S. Jiaxing, An efficient role based access control system for cloud computing. In CIT (2011), pp. 97–102
M. Raykova, H. Zhao, S.M. Bellovin, Privacy enhanced access control for outsourced data sharing. In Financial Cryptography (2012), pp. 223–238
W. Li, H. Wan, X. Ren, S. Li, A refined RBAC model for cloud computing. In ACIS-ICIS (2012), pp. 43–48
A.L. Pereira, RBAC for high performance computing systems integration in grid computing and cloud computing. In IPDPS Workshops (2011), pp. 914–921
S. Godik, T. Moses, Oasis extensible access control markup language (xacml) version 1.1. Oasis committee specification (2003)
S.T. Vinter, Extended discretionary access controls. In IEEE Symposium on Security and Privacy, (1988), pp. 39–49
W.T. Tsai, Q. Shao, Role-based access-control using reference ontology in clouds. In ISADS (2011), pp. 121–128
M.R. Sadasivan, M.K. Sangeetha, S. Karthik, A survey on access control of cloud data. IJARCET 1(8) (2012)
V. Suhendra, A survey on access control deployment. In FGIT-SecTech (2011), pp. 11–20
S.L. Reeja, Role based access control mechanism in cloud computing using co-operative secondary authorization recycling method (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Balamurugan, B., Venkata Krishna, P. (2015). Enhanced Role-Based Access Control for Cloud Security. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_89
Download citation
DOI: https://doi.org/10.1007/978-81-322-2126-5_89
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2125-8
Online ISBN: 978-81-322-2126-5
eBook Packages: EngineeringEngineering (R0)