Design of Attribute-Based Access Control in Cloud Computing Environment

Future Internet Groups have been studying networking virtualization and computing virtualization for Testbed. Specially, GENI have adopted cloud computing as computing virtualization technique. But the traditional access control models are closed and inflexible in cloud computing environment. The integration of Attribute Based Access Control (ABAC) model, which makes decisions relying on attributes of requestors, services, resources, and environment, is scalable and flexible and thus is more suitable for distributed, open systems, such as Cloud computing system. This paper presents an Attribute Based Access Control model and the authorization requirements of Cloud computing systems.

[1]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[2]  Sushil Jajodia,et al.  A logic-based framework for attribute based access control , 2004, FMSE '04.

[3]  Pierangela Samarati,et al.  A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..

[4]  Ákos Frohner,et al.  VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.

[5]  Oleg Kiselyov,et al.  Soutei, a Logic-Based Trust-Management System , 2006, FLOPS.

[6]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[7]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[8]  E. Damiani,et al.  New paradigms for access control in open environments , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[9]  Ian T. Foster,et al.  A Flexible Attribute Based Access Control Method for Grid Computing , 2008, Journal of Grid Computing.

[10]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[11]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[12]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .