Skip to main content

Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms

  • Conference paper
  • First Online:
Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

Abstract

Cloud computing users can use at the same time the same cloud service. So, there is a need for having an access control mechanism to ensure that each user cannot access any sensitive data of other users. Several access control models have been proposed for cloud computing. However, these models need to be efficient and scalable due to increased workload (e.g., users, policies, etc.) in the cloud. This paper presents a role based access control model (RBAC) for cloud computing based on naming convention (NC) concept. The WSLA specification language is used for SLAs specification. A naming convention role based access control (NC-RBAC) is presented by modifying the standard RBAC to support the NC. Then, the proposed framework is designed based on the NC-RBAC to offer a simplified designed for the system administration of security in a large institution where there are many users is challenging to control access to resources. The proposed framework is implemented and its efficiency and scalability are measured using an experiment study. The result shows that the proposed framework provides an efficient and scalable access control for cloud computing while provides an administrator with an efficient and simple search method for classifying the cloud users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mena, E., Kashyap, V., Sheth, A., Illarramendi, A.: OBSERVER: an approach for query processing in global information systems based on interoperation across pre-existing ontologies. Distrib. Parallel Databases 8(2), 223–271 (2000)

    Article  Google Scholar 

  2. Gao, K., Wang, Q., Xi, L.: Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. Int. Arab J. Inf. Technol. 11(3), 268–275 (2014)

    Google Scholar 

  3. Singh, S. (ed.): A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)

    Google Scholar 

  4. Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1948–1960 (2013)

    Article  Google Scholar 

  5. Platt, D.: Untangling access control and audit for cloud computing. In: Cloud Computing Virtual Conference (Cloud Slam 2010) (2009)

    Google Scholar 

  6. Hu, L., Ying, S., Jia, X., Zhao, K.: Towards an approach of semantic access control for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 145–156. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_13

    Chapter  Google Scholar 

  7. Urquhart, J.: Cloud Computing Bill of Rights: 2010 edition (2010)

    Google Scholar 

  8. Manue, P.D., Selvi, S.T., Barr, M.I.: Trust management system for grid and cloud resources. In: First International Conference on Advanced Computing (ICAC9), pp. 176–181. Chennai (2009)

    Google Scholar 

  9. Ali, T., Nauman, M., Fazl-e, H., Muhaya, F.B.: On usage control of multimedia content in and through cloud computing paradigm. In: 5th International Conference on Future Information Technology (FutureTech), pp. 1–5. Busan (2010)

    Google Scholar 

  10. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 29th Conference on Computer Communications, pp. 1–9. San Diego, CA, USA (2010)

    Google Scholar 

  11. Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52, 474–514 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ngo, C. (ed.): Multi-tenant attribute-based access control for cloud infrastructure services. J. Inf. Secur. Appl. 27–28, 65–84 (2016)

    Google Scholar 

  13. Tsai, W-T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, Tokyo & Hiroshima (2011)

    Google Scholar 

  14. Wache, H., Vögele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H., Hübner, S.: Ontology-based integration of information - a survey of existing approaches. In: IJCAI-01 Workshop: Ontologies and Information Sharing, vol. 2001 (2001)

    Google Scholar 

  15. Tsung-Yi, C.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)

    Article  Google Scholar 

  16. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, pp. 38–47. IEEE Computer (1996)

    Google Scholar 

  17. Halboob, W., Mahmod, R., S. Algathbar, K., Mamat, A.: TC-enabled and distributed cloud computing access control model. J. Appl. Sci. 14(7), 620–630 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This work was funded by the ministry of higher education in Saudi Arabia. Many thanks for the people from the Center of Excellence in Information Assurance (COEIA) at King Saud University and the staff from the Saudi Culture Mission in China for their immense support towards this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abed Alshreef .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Alshreef, A., Li, L., Rajeh, W. (2017). Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics