A Trust-Aware Access Control Policy for Cloud Data Protection

Article Preview

Abstract:

The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

40-44

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] W. Sujansky, S. Faus, E. Stone, P. Brennan, A method to implement fine-grained access control for personal health records through standard relational database queries, Journal of Biomedical Informatics 43(2010) 46-50.

DOI: 10.1016/j.jbi.2010.08.001

Google Scholar

[2] D. Svantesson, R. Clarke, Privacy and consumer risks in cloud computing, computer law & security review 26(2010) 391-397.

DOI: 10.1016/j.clsr.2010.05.005

Google Scholar

[3] C. Wang, N. Cao, K. Ren, W. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Systems 23(2012) 1467-1479.

DOI: 10.1109/tpds.2011.282

Google Scholar

[4] M. Nabeel, E. Bertino, Privacy Preserving Delegated Access Control in Public Clouds, Technical Report CERIAS TR 2012-11, (2012).

Google Scholar

[5] B. Lampson, Dynamic protection structures, In: AFIPS conference, Las Vegas, Nevada (1969), pp.27-38.

Google Scholar

[6] L. LaPadula, D. Bell, Secure computer systems: mathematical foundation, Bedford, Mass: Hansom AFB (1973).

Google Scholar

[7] D.T.C.S.E.C. (TCSEC), DoD 5200. 28-STD foundations, MITRE Technical Report 2547, (1973).

Google Scholar

[8] L. Yeh, Y. Chen, J. Huang, ABACS: an attribute-based access control system for emergency services over vehicular ad hoc networks, IEEE J. Sel. Areas Commun. 29(2011) 630-643.

DOI: 10.1109/jsac.2011.110312

Google Scholar

[9] D. Ferraiolo, S. Sandhu, D. Kuhn, et al, Proposed NIST standard for role-based access control, ACM Trans. Inform. Syst. Secur. 4(2001) 224-274.

DOI: 10.1145/501978.501980

Google Scholar

[10] J. Li, G. Zhao, X. Chen, et al, Fine-grained Data Access Control Systems with User Accountability in Cloud Computing, The 2nd IEEE International Conference on Cloud Computing Technology and Science, 2010, pp.89-96.

DOI: 10.1109/cloudcom.2010.44

Google Scholar

[11] X. Tang, K. Li, Z. Zeng, B. Veeravalli, A Novel Security-Driven Scheduling Algorithm for Precedence Constrained Tasks in Heterogeneous Distributed Systems, IEEE Trans. Computers, 60(2011)1017-1029.

DOI: 10.1109/tc.2010.117

Google Scholar

[12] F. Azzedin, Maheswaran, A trust brokering system and its application to resource management in public-resource grids, Proceedings of Parallel and Distributed Processing Symposium, 2004, pp.26-30.

DOI: 10.1109/ipdps.2004.1302929

Google Scholar

[13] F. Azzedin, Maheswaran, Integrating Trust into Grid Resource Management Systems, The International Conference on Parallel Processing (ICPP'02), 2002, pp.47-54.

DOI: 10.1109/icpp.2002.1040858

Google Scholar