MCACM: A Cloud Storage Access Control Model for Multi-Clouds Environment Based on XACML

Article Preview

Abstract:

Cloud storage as a popular application in cloud services, are developing from single cloud service provider towards multiple cloud service providers. As a consequence, users need to manage their files from different sources and share in multi-clouds. While the conventional access control models are no longer suitable in multi-clouds environment. Therefore, a multi-clouds access control model based on XACML, named MCACM, is proposed here to implement access control in multi-clouds environment. In this model, cross-clouds access control is enabled through extending standard XACML framework. At last, we implemented a prototype of MCACM, and performance evaluation results show that our scheme is efficient.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2451-2454

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] SNIA Technical Position. Cloud data management interface (cdmi) v1. 0. 2. http: /snia. org/ sites/default/files/CDMI%20v1. 0. 2. pdf.

Google Scholar

[2] OASIS. eXtensible Access Control Markup Language (XACML) Version 3. 0. http: /docs. oasis-open. org/ xacml/3. 0/xacml-3. 0-core-spec-os-en. pdf.

DOI: 10.1109/hicss.2005.300

Google Scholar

[3] Thuraisingham B, Khadilkar V, Gupta A, et al. Secure data storage and retrieval in the cloud[C] /Proc of the 6th IEEE Int Conf on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Piscataway, IEEE, 2010: 1-8.

DOI: 10.4108/icst.collaboratecom.2010.15

Google Scholar

[4] Bobba R, Fatemieh O, Khan F, et al. Attribute-based messaging: Access control and confidentiality[J]. ACM Transactions on Information and System Security (TISSEC), 2010, 13(4): 1-35.

DOI: 10.1145/1880022.1880025

Google Scholar

[5] Liu X, Xia Y, Jiang S, et al. Hierarchical attribute-based access control with quthentication for outsourced data in cloud computing[C]. /Proc of the 12th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom). Piscataway, IEEE, 2013: 477-484.

DOI: 10.1109/trustcom.2013.60

Google Scholar

[6] AlZain M A, Pardede E, Soh B, et al. Cloud computing security: from single to multi-clouds[C]. /Proc of the 45th IEEE Int Conf on System Science. Piscataway, IEEE, 2012: 5490-5499.

DOI: 10.1109/hicss.2012.153

Google Scholar

[7] Information on http: / www. cloudfuze. com.

Google Scholar

[8] Livenson I, Laure E. Towards transparent integration of heterogeneous cloud storage platforms[C] / Proc of the fourth Int workshop on Data-intensive distributed computing. New York: ACM, 2011: 27-34.

DOI: 10.1145/1996014.1996020

Google Scholar

[9] Huonder F. Conflict detection and resolution of XACML policies[D]. Rapperswil: University of Applied Sciences Rapperswil, 2010 (in Switzerland).

Google Scholar