Advertisement

Enhanced Role-Based Access Control for Cloud Security

  • B. Balamurugan
  • P. Venkata Krishna
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

There has been significant work done on access control previously. The proposed access control system is aiming at providing more security to enterprise resource on cloud by limiting the access of resources. Each enterprise has a different hierarchical structure based on their organizational policy. This organizational hierarchy is built using various roles that are interdependent on each other. Therefore, instead of defining the access policy for each user, the system defines access for each role. There are many standards which are available for access control such as XACML and SAML. The proposed system uses the concept of XACML for designing the policies. In addition to this feature, the system has a role request module that enables the user to hold other roles as well. This project provides a security solution via RBAC system for cloud security (RBACcs) to improve the security of data on cloud. This paper shows how the existing security standards such as XACML can be used to create and manage the policies of RBACcs. These policies are defined and designed according to current business scenario. The paper also studies the existing work done on cloud security and gives a comparative study between the proposed and the existing systems. In the end, we also proposed a few extensions to the existing system that can be made based on the security needs.

Keywords

Access control Cloud security Cyber security XACML Access policies 

References

  1. 1.
    [Paperback] T. Mather, S. Kumaraswamy, S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance (Theory in Practice) Google Scholar
  2. 2.
    S. Misra, P. Venkata Krishna, V. Saritha, H. Agarwal, L. Shu, M.S. Obaidat, Efficient medium access control for cyber physical systems with heterogeneous networks. IEEE Syst. J. (2013)Google Scholar
  3. 3.
    R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline. In ACM Workshop on Role-Based Access Control (1997), pp. 41–50 Google Scholar
  4. 4.
    R. Sandhu, D. Ferraiolo, D. Richard Kuhn, The NIST model for role-based access control: towards a unified standard. In ACM Workshop on Role-Based Access Control, (2000), pp. 47–63 Google Scholar
  5. 5.
    EE. Mon, TT. Naing, The privacy-aware access control system using attribute-and role-based access control in private cloud. In 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), vol. 28(30) (2011), pp. 447–451Google Scholar
  6. 6.
    Z. Tianyi, L. Weidong, S. Jiaxing, An efficient role based access control system for cloud computing. In CIT (2011), pp. 97–102Google Scholar
  7. 7.
    M. Raykova, H. Zhao, S.M. Bellovin, Privacy enhanced access control for outsourced data sharing. In Financial Cryptography (2012), pp. 223–238 Google Scholar
  8. 8.
    W. Li, H. Wan, X. Ren, S. Li, A refined RBAC model for cloud computing. In ACIS-ICIS (2012), pp. 43–48 Google Scholar
  9. 9.
    A.L. Pereira, RBAC for high performance computing systems integration in grid computing and cloud computing. In IPDPS Workshops (2011), pp. 914–921 Google Scholar
  10. 10.
    S. Godik, T. Moses, Oasis extensible access control markup language (xacml) version 1.1. Oasis committee specification (2003)Google Scholar
  11. 11.
    S.T. Vinter, Extended discretionary access controls. In IEEE Symposium on Security and Privacy, (1988), pp. 39–49 Google Scholar
  12. 12.
    W.T. Tsai, Q. Shao, Role-based access-control using reference ontology in clouds. In ISADS (2011), pp. 121–128 Google Scholar
  13. 13.
    M.R. Sadasivan, M.K. Sangeetha, S. Karthik, A survey on access control of cloud data. IJARCET 1(8) (2012)Google Scholar
  14. 14.
    V. Suhendra, A survey on access control deployment. In FGIT-SecTech (2011), pp. 11–20 Google Scholar
  15. 15.
    S.L. Reeja, Role based access control mechanism in cloud computing using co-operative secondary authorization recycling method (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.VIT UniversityVelloreIndia

Personalised recommendations