Research on trust-based access control model in cloud computing

In this paper we propose a trust-based dynamic access control model for cloud computing environment inspired by the GTRBAC model, where the users can validate their legal identities and acquire their access control privileges for the resources according to the role information and the trust-degree in the lightweight certificates. The trust-degree in the certificate can be calculated by the direct trust-degree (DT) and recommendation trust-degree(RT), while the access permission for the resources can be decided by comparing the trust-degree with trust-degree threshold, in order to achieve effective control for cloud computing resource. Our theoretical analysis results show that this method can effectively provide dynamic and secure access control.

[1]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[2]  Tibor Jager,et al.  A Browser-Based Kerberos Authentication Scheme , 2008, ESORICS.

[3]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[4]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[5]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[6]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[7]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[8]  Joon S. Park,et al.  Role-based access control for collaborative enterprise in peer-to-peer computing environments , 2003, SACMAT '03.

[9]  Ninghui Li,et al.  Security analysis in role-based access control , 2004, SACMAT '04.

[10]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[11]  Gail-Joon Ahn,et al.  Role-based authorization constraints specification , 2000, TSEC.

[12]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[13]  Walt Yao,et al.  Fidelis: A Policy-Driven Trust Management Framework , 2003, iTrust.

[14]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[15]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[16]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[17]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[18]  Kenli Li,et al.  Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk , 2010, ISPEC.

[19]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[20]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[21]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[22]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[23]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.