Agent-Based Cloud Broker Architecture for Distributed Access Control

Cloud computing is an emerging paradigm in the distributed computing envi- ronments where, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in the context of cloud computing, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the issue of distributed access control discussing the various approaches already adopted in this area considering the advantages and disadvantages. We propose an agent- based cloud broker architecture with computational intelligence for mediating the access requests of cloud customers, considering the present day requirements of the cloud comput- ing paradigm. We also give the workflow model for the proposed agent-based cloud broker architecture. A few open issues in the area of distributed access control are also discussed.

[1]  Zhibin Wang,et al.  Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[2]  Clara Bertolissi,et al.  An algebraic-functional framework for distributed access control , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.

[3]  Alberto RibesAbstract,et al.  Multi agent systems , 2019, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..

[4]  Anil L. Pereira RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[5]  Chang Nian Zhang,et al.  Designing secure e-commerce with role-based access control , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[6]  Weiping Shao,et al.  An attribute and role based access control model for service-oriented environment , 2010, 2010 Chinese Control and Decision Conference.

[7]  D. Bernstein,et al.  An Intercloud Cloud Computing Economy - Technology, Governance, and Market Blueprints , 2011, 2011 Annual SRII Global Conference.

[8]  D. Bernstein,et al.  Intercloud Exchanges and Roots Topology and Trust Blueprint , 2011 .

[9]  Danny B. Lange,et al.  Dispatch Your Agents; Shut Off Your Machine , 1999 .

[10]  Steven Diamond,et al.  Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.

[11]  Haicheng Xu,et al.  A dynamic Access Control model based on trust , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[12]  Gadadhar Sahoo,et al.  Identity Management in Cloud Computing -A Review , 2012 .

[13]  P. Venkataram,et al.  Applications of agent technology in communications: a review , 2004, Comput. Commun..

[14]  Thomas Magedanz,et al.  Intelligent agents: an emerging technology for next generation telecommunications? , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[15]  Rajkumar Buyya,et al.  Cloudbus Toolkit for Market-Oriented Cloud Computing , 2009, CloudCom.

[16]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[17]  Jordi Torres,et al.  Characterizing Cloud Federation for Enhancing Providers' Profit , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[18]  Joni da Silva Fraga,et al.  Integral Federated Identity Management for Cloud Computing , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[19]  V. Varadharajan,et al.  Security Agent Based Distributed Authorization : An Approach , 1998 .

[20]  Chang Nian Zhang,et al.  An object-oriented RBAC model for distributed system , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.

[21]  Antonio Puliafito,et al.  Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[22]  Antonio Puliafito,et al.  Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication , 2010, 2010 Second International Conference on Advances in Future Internet.

[23]  Leon Gommans,et al.  Domain Based Access Control Model for Distributed Collaborative Applications , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).

[24]  Byrav Ramamurthy,et al.  Hierarchy-based access control in distributed environments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[25]  Junshan Li,et al.  A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[26]  David Bernstein,et al.  Intercloud Directory and Exchange Protocol Detail Using XMPP and RDF , 2010, 2010 6th World Congress on Services.

[27]  Bruno Crispo,et al.  Towards Run-Time Verification in Access Control , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.

[28]  Antonio Puliafito,et al.  How CLEVER-based clouds conceive horizontal and vertical federations , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[29]  Antonio Puliafito,et al.  How to Enhance Cloud Architectures to Enable Cross-Federation , 2010, IEEE CLOUD.

[30]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[31]  David Bernstein,et al.  Intercloud Security Considerations , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[32]  Nick Antonopoulos,et al.  Access control for agent-based computing: a distributed approach , 2001, Internet Res..

[33]  Qiang Li,et al.  Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[34]  Chen Liu,et al.  Analysis and Design of an Access Control Model Based on Credibility , 2009, 2009 International Conference on Computer Engineering and Technology.