Payment Status and Service Level Agreement Based Access Control Method in Cloud Service Business

Cloud computing for personal use is emerging as a trend in computer industries. Service providers of cloud computing needs to control user access from business perspective. the essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. This proposed method comprises of the metadata, policy analysis rules, and access denying rules. the metadata defines the structure of access control policies and user requirement for cloud service. the policy analysis rules analyze conflicts and redundancies between access control policies. the access denying rules inhibits inappropriate access according to policies. Ontology is a theoretical foundation in this method. Payment status ontology, access permission ontology, service level ontology, and cloud ontology are used in this work to provide semantic information for rule execution. a scenario of personal data backup cloud service is also provided in this work. in the expectation, this method can provide a convenient way for cloud service providers to control user access according to changeable business and marketing strategies.

[1]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[2]  Heejo Lee,et al.  Activity-oriented access control to ubiquitous hospital information and services , 2010, Inf. Sci..

[3]  Kai Zhao,et al.  Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.

[4]  Michael Gruninger,et al.  ONTOLOGY Applications and Design , 2002 .

[5]  Liu Weidong,et al.  An Efficient Role Based Access Control System for Cloud Computing , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[6]  Amirreza Masoumzadeh,et al.  OSNAC: An Ontology-based Access Control Model for Social Networking Systems , 2010, 2010 IEEE Second International Conference on Social Computing.

[7]  Ivan Stojmenovic,et al.  DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Dave Durkee,et al.  Why Cloud Computing Will Never Be Free , 2010, ACM Queue.

[9]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..