Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.10.032

An Entity Attribute-Based Access Control Model in Cloud Environment  

Choi, Eun-Bok (Dept. of Smartmedia, Jeonju University)
Publication Information
Journal of Convergence for Information Technology / v.10, no.10, 2020 , pp. 32-39 More about this Journal
Abstract
In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.
Keywords
Cloud Computing; Virtualization Security; Access Control; MAC; DAC; Security Policy; Relation; Context;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 R. Aluvalu & L. Muddana. (2016). A Dynamic atttribute-based risk aware access control model(DA-RAAC) for cloud computing, IEEE International Conference on Computational Intelligence and Computing Research(ICCIC), DOI : 10.1109/iccic.2016.7919618
2 G. Sala, D. Sgandurra & F. Baiardi. (2007). Security and Integrity of a Distributed File Storage in a Vitual Environment, Fourth Inernational IEEE Security In Storage Workshop, 58-69. DOI : 10.1109/SISW.2007.10
3 G. Cheng, H. Jin, D. Zou, A. Ohoussou & F. Zhao. (2008). A Prioritized Chinese Wall Model for Mananging the Covert Information Flows in Virtual Machine Systems, The 9th Inernational Conference for Young Computer Scienttists, 1481-1487. DOI : 10.1109/ICYCS.2008.534.
4 E. Choi, (2018), A Virtualization Management Convergence Access Control Model for Cloud Computing Environments, Journal of Convergence for Information Technology, 8(5), 69-75. DOI : 10.22156/CS4SMB.2018.8.5.069   DOI
5 X. Ding & J. Yang, (2019), An Access Control Model and Its Application in Blockchain, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), 163-167. DOI : 10.1109/CISCE.2019.00044
6 E. Choi & S. Lee(2016), Access Control Mechanism based on MAC for Cloud Convergence, Journal of the Korea Convergence Society, 7(1), 1-8. DOI : 10.15207/jkcs.2016.7.1.001   DOI
7 C. Musca, A. Ion, C.Leordeanu & V. Cristea. (2013). Secure Aceess to Cloud Resource RBAC in Cloud System, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 554-558.
8 F. Sabdhi. (2011). Cloud Computing Security Threates and Responses,, Inernational Conference on Communication Software and Networks(ICCSN), 245-249.
9 F. Sabdhi. (2011). Virtualization-Lever Security in Cloud Computing, Inernational Conference on Communication Software and Networks(ICCSN), 250-254.
10 T. Shinagawa, H. Eiraku, S. Hasegawa, K. Omote, K. Tanimoto, T. Horie & K. Kato. (2008). Introducing Role-based Access Control to a Secure Virtual Machine Monitor :Security Policy Enforcement Mechanism for Distributed Computers, 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230. DOI : 10.1109/APSCC.2008.14
11 http://aws.amazon.com/ec2.
12 http://aws.amazon.com/s3.
13 http://aws.vmware.com/products/vcenter-server.html
14 British Standards. (2013). ISO/IEC 27001: 2013: Information Technology--Security Techniques--Information Security Management Systems--Requirements. International Organization for Standardization.
15 C. Pengrui, W. LingDa, Y. Chao & Y. Ronghuan. (2016). A Hierachical Access Control Model of Software Repository Based on RBAC, IEEE, 761-765. DOI : 10.1109/icsess.2016.7883179
16 T. Win, H Tianfield & Q. Mair. (2014). Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection, 2014 IEEE/ACM 7th International Conference on Utitiy and Cloud Computing, 1004-1009.
17 Y. Sanches, S. Demurjian & M. Baihan. (2019). A Service-based RBAC & MAC approach incorporate into the FHIR standard, Digital Communications and Networks, 5, 214-225. DOI : 10.1016/j.dcan.2019.10.004   DOI
18 B. Taubmann, N. Rakotondravony & H. Reiser, (2016), CloudPhylactor:Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers, 2016 IEEE TrustCom-BigDataSE-ISPA, 957-964. DOI : 10.1109/TrustCom.2016.160