The Community for Technology Leaders
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)
Melbourne, VIC Australia
July 16, 2013 to July 18, 2013
pp: 485-492
Mansura Habiba , Dept. of Comput. Sci., American Int. Univ. Bangladesh, Dhaka, Bangladesh
Md Rafiqul Islam , Dept. of Comput. Sci., American Int. Univ. Bangladesh, Dhaka, Bangladesh
A. B. M. Shawkat Ali , i-Lab. Australia, QLD, Australia
ABSTRACT
Managing data access control in an authorized and authenticated way is still one of the key challenge in cloud security. In a complex environment like cloud, data owner and Cloud Service Provider (CSP) need to monitor continuously who is accessing which data in order to prevent unauthorized access. Moreover, it should be pre-defined that who can perform which operation on particular data, which can reduce unauthorized access to a great extent. In this regard, user's access to any data, application and services reside in cloud should be controlled, managed dynamically and monitored continuously. Most of cases the traditional system is not efficient enough to cope up with dynamic cloud environment, due to high dynamicity, data virtualization and multi-tenancy, higher scalability and higher degree of integrity. Existing systems also merely provide efficient auditing and reporting functionality regarding access control management. In this research we have designed a data intensive dynamic access control model for cloud environment. Several authorization algorithms are devised in this paper. Our proposed access control model has portrayed the system framework and different module along with their functionalities. Multi Agent based System (MAS) is represented to define the accessibility and functionality of the proposed model. Moreover, an enhanced authorization scheme is driven in this work to improve the security of the proposed system. We have also represented security and efficiency analysis of proposed models which has shown that our proposed scheme is efficient and secured enough to deals with the access control management.
INDEX TERMS
Permission, Authorization, Cloud computing, Authentication, Data models
CITATION

M. Habiba, M. R. Islam and A. B. Ali, "Access Control Management for Cloud," 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TRUSTCOM), Melbourne, VIC Australia, 2014, pp. 485-492.
doi:10.1109/TrustCom.2013.61
266 ms
(Ver 3.3 (11022016))