Self-Adaptive Access Control Model Based on Feedback Loop

Users can utilize powerful computing resources in cloud computing, which brings users great convenience. However, cloud computing is also facing many challenges for data security as the users outsource their sensitive data to clouds, which are generally beyond the same trusted domain as data owners. To address this problem, access control, which grants access permissions to an authorized user, is considered as one of critical security mechanisms for data protection in cloud computing environment. However, due to the unpredictability of user identities and access behavior, access control in cloud computing has become a key security problem. In this paper, we propose a self-adaptive access control model based on feedback loop. The feedback loop includes monitor, analyze, plan, execute parts and knowledge base, and the knowledge base is used to make decisions on access requests. We also propose an algorithm of access attributes' relation degree for knowledge base. The self-adaptive access control model based on feedback loop we proposed can be applied to cloud computing environment.

[1]  Young Ik Eom,et al.  Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[2]  Franco Zambonelli,et al.  A survey of autonomic communications , 2006, TAAS.

[3]  Walid G. Aref,et al.  A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.

[4]  David W. Chadwick,et al.  Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[5]  Jose M. Alcaraz Calero,et al.  Toward a Multi-Tenancy Authorization System for Cloud Services , 2010, IEEE Security & Privacy.

[6]  V. S. Shankar Sriram,et al.  A Review on Security Issues in Cloud Computing , 2013 .

[7]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[8]  Fumio Teraoka,et al.  Collaborative Access Control for Multi-Domain Cloud Computing , 2012, IEICE Trans. Inf. Syst..

[9]  Fabio Massacci,et al.  Interactive access control for autonomic systems: From theory to implementation , 2008, TAAS.

[10]  Mary Shaw,et al.  Engineering Self-Adaptive Systems through Feedback Loops , 2009, Software Engineering for Self-Adaptive Systems.

[11]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[12]  Christian Peper,et al.  Component engineering for adaptive ad-hoc systems , 2008, SEAMS '08.

[13]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[14]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  Koji Hashimoto,et al.  Dynamic self-adaptation for distributed service-oriented transactions , 2012, 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[16]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.