Agent-based approach for distributed access control in cloud environments

Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, for the successful and efficient completion of their tasks. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. Hence, the proper access control of distributed shared resources assumes high significance, as far as the secure computing paradigm is concerned. In this paper, we make an analysis of the distributed access control issue considering the various mechanisms proposed by the researchers in this area, discussing their merits and demerits. The issues and concerns in different contexts of distributed computing environments are highlighted. We propose an agent-based approach for the distributed access control in cloud environments for mediating the access requests of cloud consumers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based approach for the distributed access control in cloud. A few open issues in the area of distributed access control are also discussed.

[1]  V. Varadharajan,et al.  Security Agent Based Distributed Authorization : An Approach , 1998 .

[2]  Nick Antonopoulos,et al.  Access control for agent-based computing: a distributed approach , 2001, Internet Res..

[3]  P. Venkataram,et al.  Applications of agent technology in communications: a review , 2004, Comput. Commun..

[4]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[5]  Junshan Li,et al.  A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[6]  Danny B. Lange,et al.  Dispatch Your Agents; Shut Off Your Machine , 1999 .

[7]  Qiang Li,et al.  Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[8]  Chang Nian Zhang,et al.  Designing secure e-commerce with role-based access control , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[9]  Chen Liu,et al.  Analysis and Design of an Access Control Model Based on Credibility , 2009, 2009 International Conference on Computer Engineering and Technology.

[10]  Clara Bertolissi,et al.  An algebraic-functional framework for distributed access control , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.

[11]  Alberto RibesAbstract,et al.  Multi agent systems , 2019, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..

[12]  Zhibin Wang,et al.  Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[13]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[14]  Henryk Krawczyk,et al.  Generalized access control in hierarchical computer network , 2010, 2010 2nd International Conference on Information Technology, (2010 ICIT).

[15]  Chang Nian Zhang,et al.  An object-oriented RBAC model for distributed system , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.

[16]  Thomas Magedanz,et al.  Intelligent agents: an emerging technology for next generation telecommunications? , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[17]  Leon Gommans,et al.  Domain Based Access Control Model for Distributed Collaborative Applications , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).

[18]  Byrav Ramamurthy,et al.  Hierarchy-based access control in distributed environments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[19]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[20]  Christoph Meinel,et al.  A framework for supporting distributed access control policies , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[21]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[22]  Gerhard Weiss,et al.  Multi-Agent Systems , 2013 .

[23]  Gadadhar Sahoo,et al.  Identity Management in Cloud Computing -A Review , 2012 .

[24]  Anil L. Pereira RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[25]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[26]  Weiping Shao,et al.  An attribute and role based access control model for service-oriented environment , 2010, 2010 Chinese Control and Decision Conference.

[27]  Haicheng Xu,et al.  A dynamic Access Control model based on trust , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[28]  Bruno Crispo,et al.  Towards Run-Time Verification in Access Control , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.