A New RBAC Based Access Control Model for Cloud Computing

Access Control is an important component of Cloud Computing; specially, User access control management; however, Access Control in Cloud environment is different from traditional access environment and using general access control model can't cover all entities within Cloud Computing, noting that Cloud environment includes different entities such as data owner, end user, and service provider. In this paper, we propose a new access control based on Role-based access control (RBAC) model. This model includes two kind of roles, user role (UR) and owner role (OR); such that, Users get credential from owners to communicate with service provider and to get access permissions of resources. We also discuss the aspects of user access control management, such as authentication, privilege management, and deprovisioning. Moreover, we use administrative scope to update hierarchy when there is a role added or revoked to simplify the user access control management. By applying the model in Cloud environment the results shows that it can reduce the security problems to two classes in the RT [←,∩] role-based trust-management language with a test-paper system.

[1]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[2]  Ninghui Li,et al.  On mutually-exclusive roles and separation of duty , 2004, CCS '04.

[3]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[4]  Mokdong Chung,et al.  Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[5]  Sylvia L. Osborn,et al.  Access Rights Administration in Role-Based Security Systems , 1994, DBSec.

[6]  Ninghui Li,et al.  Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.

[7]  Luigi V. Mancini,et al.  Administrative scope in the graph-based framework , 2004, SACMAT '04.

[8]  George Loizou,et al.  Administrative scope: A foundation for role-based administrative models , 2003, TSEC.

[9]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[10]  Dieter Gollmann,et al.  Computer Security — ESORICS 2002 , 2002, Lecture Notes in Computer Science.

[11]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Luigi V. Mancini,et al.  Decidability of Safety in Graph-Based Models for Access Control , 2002, ESORICS.

[14]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[15]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[16]  Elisa Bertino,et al.  Temporal hierarchies and inheritance semantics for GTRBAC , 2002, SACMAT '02.

[17]  Chuang Lin,et al.  Security Analysis of Maindatory Access Control Model , 2004 .