Contract RBAC in cloud computing

Cloud computing is a fast growing field, which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources based on their payments. The issue of access control is an important security scheme in the cloud computing. In this paper, a Contract RBAC model with continuous services for user to access various source services provided by different providers is proposed. The Contract RBAC model extending from the well-known RBAC model in cloud computing is shown. The extending definitions in the model could increase the ability to meet new challenges. The Contract RBAC model can provide continuous services with more flexible management in security to meet the application requirements including Intra-cross cloud service and Inter-cross cloud service. Finally, the performance analyses between the traditional manner and the scheme are given. Therefore, the proposed Contract RBAC model can achieve more efficient management for cloud computing environments.

[1]  Yong Zhang,et al.  Cognitive access control in cognitive heterogeneous networks , 2009, 2009 IEEE International Conference on Communications Technology and Applications.

[2]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Wei Li,et al.  A Refined RBAC Model for Cloud Computing , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.

[4]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[5]  Shiuh-Jeng Wang,et al.  Temporal and Location-Based RBAC Model , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[6]  Stephen S. Yau,et al.  Software Engineering Meets Services and Cloud Computing , 2011, Computer.

[7]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[8]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[9]  Rakesh Gupta Above the Clouds: A View of Cloud Computing , 2012 .

[10]  M. Zaharia,et al.  Above the Clouds : A View of Cloud Computing , 2009 .

[11]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[12]  Hsing-Chung Chen,et al.  A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..

[13]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[14]  Meina Song,et al.  The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[15]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[16]  Guillermo Navarro-Arribas,et al.  Intra-role Progression in RBAC: An RPG-Like Access Control Scheme , 2011, DPM/SETOP.