Abstract
Cloud computing users can use at the same time the same cloud service. So, there is a need for having an access control mechanism to ensure that each user cannot access any sensitive data of other users. Several access control models have been proposed for cloud computing. However, these models need to be efficient and scalable due to increased workload (e.g., users, policies, etc.) in the cloud. This paper presents a role based access control model (RBAC) for cloud computing based on naming convention (NC) concept. The WSLA specification language is used for SLAs specification. A naming convention role based access control (NC-RBAC) is presented by modifying the standard RBAC to support the NC. Then, the proposed framework is designed based on the NC-RBAC to offer a simplified designed for the system administration of security in a large institution where there are many users is challenging to control access to resources. The proposed framework is implemented and its efficiency and scalability are measured using an experiment study. The result shows that the proposed framework provides an efficient and scalable access control for cloud computing while provides an administrator with an efficient and simple search method for classifying the cloud users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mena, E., Kashyap, V., Sheth, A., Illarramendi, A.: OBSERVER: an approach for query processing in global information systems based on interoperation across pre-existing ontologies. Distrib. Parallel Databases 8(2), 223–271 (2000)
Gao, K., Wang, Q., Xi, L.: Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. Int. Arab J. Inf. Technol. 11(3), 268–275 (2014)
Singh, S. (ed.): A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1948–1960 (2013)
Platt, D.: Untangling access control and audit for cloud computing. In: Cloud Computing Virtual Conference (Cloud Slam 2010) (2009)
Hu, L., Ying, S., Jia, X., Zhao, K.: Towards an approach of semantic access control for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 145–156. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_13
Urquhart, J.: Cloud Computing Bill of Rights: 2010 edition (2010)
Manue, P.D., Selvi, S.T., Barr, M.I.: Trust management system for grid and cloud resources. In: First International Conference on Advanced Computing (ICAC9), pp. 176–181. Chennai (2009)
Ali, T., Nauman, M., Fazl-e, H., Muhaya, F.B.: On usage control of multimedia content in and through cloud computing paradigm. In: 5th International Conference on Future Information Technology (FutureTech), pp. 1–5. Busan (2010)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 29th Conference on Computer Communications, pp. 1–9. San Diego, CA, USA (2010)
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52, 474–514 (2005)
Ngo, C. (ed.): Multi-tenant attribute-based access control for cloud infrastructure services. J. Inf. Secur. Appl. 27–28, 65–84 (2016)
Tsai, W-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, Tokyo & Hiroshima (2011)
Wache, H., Vögele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H., Hübner, S.: Ontology-based integration of information - a survey of existing approaches. In: IJCAI-01 Workshop: Ontologies and Information Sharing, vol. 2001 (2001)
Tsung-Yi, C.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, pp. 38–47. IEEE Computer (1996)
Halboob, W., Mahmod, R., S. Algathbar, K., Mamat, A.: TC-enabled and distributed cloud computing access control model. J. Appl. Sci. 14(7), 620–630 (2014)
Acknowledgments
This work was funded by the ministry of higher education in Saudi Arabia. Many thanks for the people from the Center of Excellence in Information Assurance (COEIA) at King Saud University and the staff from the Saudi Culture Mission in China for their immense support towards this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alshreef, A., Li, L., Rajeh, W. (2017). Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-4154-9_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4153-2
Online ISBN: 978-981-10-4154-9
eBook Packages: EngineeringEngineering (R0)