• 제목/요약/키워드: access control model

검색결과 656건 처리시간 0.033초

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

통합 접근 제어를 위한 시뮬레이션 모델 설계 (Design of a Simulation Model for Integrated Access Control)

  • 이호
    • 한국컴퓨터정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.49-54
    • /
    • 2004
  • 규칙 기반 접근 제어가 신분 기반 접근 제어의 완전한 대체 방법이 아니듯이 직무 기반 접근 제어도 신분 기반 접근 제어와 규칙 기반 접근 제어의 병합이 아닌 상호 보완적인 방법이다. 본 논문에서는 기존의 접근 제어 메커니즘을 통합하여 보안성 무결성 및 흐름 제어 보안 기능을 제공하며 직무 중심 조직의 접근 제어 요구를 용이하게 수용할 수 있는 새로운 방식의 통합 접근 제어를 위한 시뮬레이션 모델을 설계하여 이를 실제의 응용 시스템에 적용할 수 있도록 한다.

  • PDF

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제8권1호
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델 (Extended Role Based Access Control Model with Multilevel Security Control)

  • 김학범;홍기융;김동규
    • 한국정보처리학회논문지
    • /
    • 제7권6호
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

안전한 EDI 서비스를 위한 접근제어 모델 설계 (Design of Access Control Model for Secure EDI Service)

  • 박진호;정진욱
    • 디지털콘텐츠학회 논문지
    • /
    • 제1권1호
    • /
    • pp.23-37
    • /
    • 2000
  • EDI는 은행업무, 무역, 의학, 출판 등의 다양한 활동이나 사업에 관련된 메시지를 컴퓨터들간에 상호 교환한다는 개념이다. 그러므로, 보안성, 신뢰성 및 특수 기능성이 EDI 시스템의 절대적 요구사항이다. 이러한 요구사항 중 보안성에 대한 요구사항을 만족시키기 위한 접근제어 모델을 설계하고자 한다. 정보시스템에 있어서의 접근제어는 실체에 대한 모든 접근은 보안정책에 의해서 정해진 접근모드나 규칙에 따라 발생한다는 것을 보장하기 위한 것이다. 본 논문에서는, 접근제어 모델을 위한 보안정책을 신분기반 정책, 규칙기반 정책, 직무기반 정책 측면에서 제시한다. 정의한 보안정책을 수행하기 위해서 유도된 접근제어 규칙과 오퍼레이션에 기초한 안전한 EDI 서비스를 제공하기 위한 접근제어 모델을 설계한다. 제안한 접근제어 모델은 EDI 메시지에 대한 무결성, 비밀성 및 흐름제어를 제공한다.

  • PDF

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

확장된 역할기반 접근제어 모델에서 GRBAC을 이용한 프라이버시 제어 (Privacy Control Using GRBAC In An Extended Role-Based Access Control Model)

  • 박종화;김지홍;김동규
    • 한국통신학회논문지
    • /
    • 제30권3C호
    • /
    • pp.167-175
    • /
    • 2005
  • 최근 프라이버시 적용이 IT분야의 가장 중요한 문제의 하나로 대두되고 있다. 프라이버시 보호는 조직의 데이터 처리 시스템에 프라이버시 정책을 적용함으로써 달성될 수 있다. 전통적인 보안 모델은 목적 결합(purpose binding)과 같은 프라이버시의 기본적인 요구사항을 적용하기에 부적절하다. 본 논문은 기존의 보안모델에 통합하여 쉽게 적용할 수 있는 프라이버시 제어 모델을 제안한다. 이를 위하여 기존의 보안모델로 RBAC과 도메인-타입을 적용하여 문맥기반 접근제어를 제공하는 하나의 확장된 역할기반 접근제어 모델이 사용되었고, 프라이버시 제어 모델에서는 프라이버시 선호로 표현되는 목적 결합을 적용하기위해 GRBAC이 사용되었다. 또 이 모델의 응용을 위하여 작은 병원 모델이 고려되었다.

역할계층을 포함하는 역할기반 접근통제 모델 (Role Based Access Control Model contains Role Hierarchy)

  • 김학범;김석우
    • 융합보안논문지
    • /
    • 제2권2호
    • /
    • pp.49-58
    • /
    • 2002
  • 역할기반 접근통제는 추상적 기본 개념의 임의적 접근통제나 강제적 접근통제에 비하여 응용 개념의 역할에 기반한 접근통제 모델이다. 모델은 BLP 모델에서 출발한 커널 단위의 액세스 제어의 제한적 기능과 달리 다양한 컴퓨터 네트워크 보안분야에 있어서 유연성과 적용성을 제공한다. 본 논문에서는 기존의 역할기반 접근통제 기본 모델인 $RBAC_0$ 모델에 주체 및 객체의 역할을 추가로 고려한 역할 계층을 포함하는 확장된 역할기반 접근통제 ($ERBAC_0$ : Exteded $RBAC_0$ 모델을 제안하였다. 제안된 $ERBAC_0$ 모델은 기존의 $RBAC_0$ 모델에 비하여 주체 및 객체 수준에서의 역할을 계층적으로 정교하게 할당하고, 할당된 역할에 기반하여 접근통제 서비스를 보다 유연하게 제공할 수 있다.

  • PDF