원문정보
초록
영어
In view of malicious insider attacks on cloud computing environments, a new Context-Aware Access Control Model for cloud computing (CAACM) was presented. According to the characteristic of cloud computing, we take spatial state, temporal state and platform trust level as context. The model establishes mechanisms of authorization from cloud management role to objects, which enables dynamic activation of role permission by associating cloud management role with context. It also achieves fine-grained access control on cloud objects by supervising the permission of management role in full life cycle. Moreover, it introduces the concept of exclusive managerial role, which extends access control from static protection on resources to dynamic authorization on managerial roles. Further, it describes the approach of role permission activation systematically. CAACM formally proves to be safe and it lays the groundwork for the deployment of CAACM in cloud computing systems.
목차
1. Introduction
2. CAACM
2.1. Fundamental Conceptions
2.2. Formal Definition
2.3. Access Control Policies
2.4. Access Control Mechanism
2.5. Security Proof
3. Application of CAACM
4. Model Comparison
5. Conclusion and Future Work
Acknowledgements
References
저자정보
참고문헌
- 1(Reference title not available)
- 2(Reference title not available)
- 3Action-Based Access Control Model and Administration of Actions네이버 원문 이동
- 4(Reference title not available)
- 5API access control in cloud using the Role Based Access Control Model네이버 원문 이동
- 6(Reference title not available)
- 7(Reference title not available)
- 8(Reference title not available)
- 9Cloud security and privacy네이버 원문 이동
- 10(Reference title not available)
- 11The ARBAC97 model for role-based administration of roles네이버 원문 이동
- 12RBAC-Based Access Control for SaaS Systems네이버 원문 이동
- 13(Reference title not available)
- 14Towards trusted cloud computing네이버 원문 이동
- 15Formal specification for role based access control user/role and role/role relationship management네이버 원문 이동
- 16Access control security model based on behavior in cloud computing environment네이버 원문 이동
- 17(Reference title not available)
- 18Study on Cloud Computing Security네이버 원문 이동