Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.5.069

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments  

Choi, Eun-Bok (Department of Smartmedia, Jenoju University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.5, 2018 , pp. 69-75 More about this Journal
Abstract
The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.
Keywords
Cloud Services; Virtualizaion; Network Management; Access Control; Convergence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Benedetti & M. Mori. (2018). Parametric RBAC Maintenance via Max-SAT. ACM on Symposium on Access Control Models and Technologies, 15-25. DOI : 10.1145/3205977.3205987
2 R. Aluvalu & L. Muddana. (2016). A Dynamic attribute-based risk aware access control model(DA-RAAC) for cloud computing. IEEE International Conference on Computational Intelligence and Computing Research. DOI : 10.1109/iccic.2016.7919618
3 D. Zou, L. Shi & H. Jin. (2009). DVM_MAC:A Mandatory Access Control System in Distributed Virtual Computing Enviroment, IEEE 15th Internaltional Conference on Parallel and Distributed Systems, 556-563, DOI : 10.1109/ICPADS.2009.128
4 W. Li, H. Wan, X. Ren & S. Li. (2012). A Refined RBAC Model for Cloud Computing, IEEE/ACIS International Conference on Computer and Information Science, 43-48 DOI : 10.1109/icis.2012.13
5 C. Weng, Y. Luo, M. Li & X. Lu. (2008). A BLP-based Access Control Mechanism for the Virtual Machine System, IEEE 9th International Conference for Young Computer Scientists, 2278-2282. DOI : 10.1109/ICYCS.2008.503
6 H. Zhu, Y. Xue, Y. Zhang, X. Chen, H. Li & X. Liu. (2013). V-MLR:A Multilevel Security Model for Virtualization, IEEE 5th International Conference on Intelligent Networking and Collaborative Systems, 9-16. DOI : 10.1109/INCoS.2013.12
7 L. Kerr & J. Alves-Foss. (2016). Combining Mandatory and Attribute-bsed Access Control, IEEE 49th Hawaii International Conference o System Sciences, 2616-2623. DOI : 10.1109/HICSS.2016.328
8 S. M. Lee, S. B. Suh, B. D Jeong & S. D. Mo. (2008). A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization, IEEE Communications Society, 251-256 DOI : 10.1109/ccnc08.2007.63
9 Amazon Elastic Compute Cloud(EC2). (2009). http://aws.amazon.com/ec2.
10 E. B. Choi & S. J. Lee. (2016). Acces Control Mechanism based on MAC for Cloud Convergence, Jouunal of the Korea Convergence Society, 1-8 DOI : 10.15207/jkcs.2016.7.1.001
11 R. S. Sandhu, E. J. Coyne, H. L. Feinstein & C. E. Youman. (1996) Role-Based Access Control Models, COMPUTER SOCIETY, IEEE, 38-47
12 Amazon Simple Storage Service(S3) (2009). http://aws.amazon.com/s3.
13 VMware vCenter Server. (2011). http://aws.vmware.com/products/vcenter-server.
14 Windows Server 2008 Virtualization with Hyper-V. (2009).http://www.microsoft.com/windowsserver2008/en/us/hyperv-main.aspx.
15 Ovirt. (2011). http://www.ovirt.org/.
16 British Standards. (2013). ISO/IEC 27001:2013(E) (Information technlolgy-Security techniques-A Information security management systems-Rquirements)
17 Y. Zhu, C. J. Hu, & X. Wang. (2015). From RBAC to ABAC:Constructing Flexible Data Access Control for Cloud Storage Services, IEEE Transactions on Services Computing, 8(4), 601-616. DOI : 10.1109/TSC.2014.2363474   DOI
18 C. Pengrui, W. LingDa, Y. Chao & Y. Ronghuan. (2016). A Hierachical Access Control Model of Software Repository Based on RBAC, IEEE, 761-765 DOI : 10.1109/icsess.2016.7883179