2014 IEEE 11th International Conference on E-Business Engineering 2014
DOI: 10.1109/icebe.2014.56
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Fine-Grained Access Control for Cloud

Abstract: The centerpiece of an efficient Cloud security architecture is a well-defined access control policy. In literature we can find several access control models such as the Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCON ABC ).The UCON ABC is very suitable for the context of distributed systems like cloud computing but it doesn't give any implementation method. In this paper we define… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Because of this change in access control become easier. [8] But this flexibility increases the occurrences of policy conflicts and makes the maintenance and administration of the policies difficult. After some time period because of this reason developers decided that ABA is not efficient.…”
Section: Fig D: Attribute Based Access Control (Abac)mentioning
confidence: 99%
“…Because of this change in access control become easier. [8] But this flexibility increases the occurrences of policy conflicts and makes the maintenance and administration of the policies difficult. After some time period because of this reason developers decided that ABA is not efficient.…”
Section: Fig D: Attribute Based Access Control (Abac)mentioning
confidence: 99%
“…The decisions in MAC are not made by an owner but a central system [11,12]. In this way, more powerful processes are performed in security models [57,64,65].…”
Section: Mandatory Access Controlmentioning
confidence: 99%
“…Langaliya and Aluvalu [108] discussed traditional access control models and their advantages-disadvantages. Msahli, Chen and Serhrouchni [12] define the profile as the combination of all possible authorization, role, and other access parameters in Cloud system. Yang, Liu, Jia, and Shen [109] focus on how to securely share video contents to a certain group of people in cloud-based multimedia systems, and propose a cryptographic approach, a provably secure time domain attribute-based access control (TAAC) scheme, to secure the cloud-based video content sharing for that they analyzed ABAC and ABE.…”
Section: Reviewmentioning
confidence: 99%
See 2 more Smart Citations