We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing

by Sultan Ullah, Zheng Xuefeng, Zhou Feng
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 2
Year of Publication: 2013
Authors: Sultan Ullah, Zheng Xuefeng, Zhou Feng
10.5120/10049-4636

Sultan Ullah, Zheng Xuefeng, Zhou Feng . TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing. International Journal of Computer Applications. 62, 2 ( January 2013), 1-7. DOI=10.5120/10049-4636

@article{ 10.5120/10049-4636,
author = { Sultan Ullah, Zheng Xuefeng, Zhou Feng },
title = { TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 2 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number2/10049-4636/ },
doi = { 10.5120/10049-4636 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:34.096017+05:30
%A Sultan Ullah
%A Zheng Xuefeng
%A Zhou Feng
%T TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 2
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources / services against security infringements. Based on analysis of current cloud computing security characteristics, the preamble of the concept of trust, role-based access control policy, combined with the characteristics of the cloud computing environment, there are multiple security management domains, so a new cross domain framework is for access control is proposed which is based on trust. It will establish and calculate the degree of trust in the single as well as multiple domains. Role Based Access Control is used for the implementation of the access control policies in a single domain environment with the introduction of the trust concept. In multiple domains the access control will be based on the conversion of roles. On the basis of trust, and role based access control model, a new novel framework of flexible cross – domain access control framework is presented. The role assignment and conversion will take place dynamically.

References
  1. Wang, L. , Von Laszewski, G. , Younge, A. , He, X. , Kunze, M. , Tao, J. , & Fu, C. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146.
  2. Ullah, Sultan, Zheng Xuefeng, Zhou Feng, and Zhao Haichun. "Tcloud: Challenges And Best Practices For Cloud Computing. " International Journal of Engineering 1, no. 9 (2012).
  3. Khan, Nawsher, Ahmad Noraziah, Mustafa Mat Deris, and Elrasheed I. Ismail. "CLOUD COMPUTING: Comparison of Various Features. " DEIS (2011): 243-254.
  4. Rimal, B. P. , Choi, E. , & Lumb, I. (2010). A taxonomy, survey, and issues of cloud computing ecosystems. Cloud Computing, 21-46.
  5. Lenk, A. ; Klems, M. ; Nimis, J. ; Tai, S. ; Sandholm, T. ; , "What's inside the Cloud? An architectural map of the Cloud landscape," Software Engineering Challenges of Cloud Computing, 2009. CLOUD '09. ICSE Workshop on , vol. , no. , pp. 23-31, 23-23 May 2009
  6. Ahmed, Khandakar Entenam Unayes, and Vassil Alexandrov. "Identity and Access Management in Cloud Computing. " Cloud Computing for Enterprise Architectures (2011): 115-133.
  7. Blaze, M. ; Feigenbaum, J. ; Lacy, J. ; , "Decentralized trust management," Security and Privacy, 1996. Proceedings. , 1996 IEEE Symposium on , vol. , no. , pp. 164-173, 6-8 May 1996
  8. Jincui, Chen, and Jiang Liqun. "Role-Based Access Control Model of Cloud Computing. " Energy Procedia 13 (2011): 1056-1061.
  9. Tan, Zhanjiang, Zhuo Tang, Renfa Li, Ahmed Sallam, and Liu Yang. "Research on trust-based access control model in cloud computing. " In Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International, vol. 2, pp. 339-344. IEEE, 2011.
  10. Santos, Nuno, Krishna P. Gummadi, and Rodrigo Rodrigues. "Towards trusted cloud computing. " Proceedings of the 2009 conference on Hot topics in cloud computing. USENIX Association, 2009.
  11. Sadeghi, Ahmad-Reza, Thomas Schneider, and Marcel Winandy. "Token-based cloud computing. " Trust and Trustworthy Computing (2010): 417-429.
  12. Grandison, T. , & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, IEEE, 3(4), 2-16.
  13. Rui Wang; Yang Liu; Yuexiang Yang; Xiaoyong Zhou; , "Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines," Intelligent Systems Design and Applications, 2006. ISDA '06. Sixth International Conference on , vol. 2, no. , pp. 534-539, 16-18 Oct. 2006
  14. Beth, T. , Borcherding, M. , & Klein, B. (1994). Valuation of trust in open networks. Computer Security—ESORICS 94, 1-18.
  15. Jøsang, A. (2001). A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(03), 279-311.
  16. Al-Muhtadi, Jalal, et al. The A-IRBAC 2000 model: Administrative interoperable role-based access control. Technical Report, UIUCDCS, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Trust Security Access Control Multiple – Domains Role Conversion