期刊文献+

Cloud authorization: exploring techniques and approach towards effective access control framework 被引量:3

Cloud authorization: exploring techniques and approach towards effective access control framework
原文传递
导出
摘要 Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models. Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期297-321,共25页 中国计算机科学前沿(英文版)
关键词 AUTHORIZATION access control software as a ser-vice extensible access control markup language identity &access management cloud security authorization, access control, software as a ser-vice, extensible access control markup language, identity &access management, cloud security
  • 相关文献

参考文献50

  • 1Abadi D J. Data management in the cloud: limitations and opportuni- ties. IEEE Data Engineering Bulletin, 2009, 32(1): 3-12.
  • 2Rimal B, Choi E, Lumb I. A taxonomy and survey of cloud computing systems. In: Proceedings of the 5th International Joint Conference on INC, IMS and IDC. 2009, 44-51.
  • 3Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Appli- cations, 2011, 34(1): 1-11.
  • 4Bisong A, Rahman M. An overview of the security concerns in enter- prise cloud computing. International Journal of Network Security & Its Application, 2011, 3(1): 30-45.
  • 5Popovic K, Hocenski Z. Cloud computing security issues and chal- lenges. In: Proceedings of the 33rd International Convention on MIPRO. 2010, 344-349.
  • 6Arasu A, Eguro K, Kaushik R, Ramamurthy R. Querying encrypted data. In: Proceedings of the IEEE 29th International Conference on Data Engineering (ICDE). 2013, 1262-1263.
  • 7Simmonds P, Yeomans A, Dobson I, Arnold J, Secombe A, Johnson P,Tully S, Ramamorthy B, Kumaraswamy S, Mishra R, Lang U, Laun- drup J, Wilson Y. Security Guidance for Critical Area of Focus in Cloud Computing v3.0. Cloud Security Alliance (CSA), 2011.
  • 8Lampson B. Dynamic protection structures. In: Proceedings of the AFIPS Conference. 1969, 27-38.
  • 9Elisa Bertino R. Database security-concepts, approaches, and chal- lenges. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 1-11.
  • 10M. G. Piattini M, Fernandez-Medina E. Secure databases: state of the art. In: Proceedings of the IEEE 34th Annual International Carnahan Conference on Security Technology. 2000.

同被引文献16

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部