We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Policy Specification in Role based Access Control on Clouds

by Gitanjali, Sukhjit Singh Sehra, Jaiteg Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 1
Year of Publication: 2013
Authors: Gitanjali, Sukhjit Singh Sehra, Jaiteg Singh
10.5120/13078-0253

Gitanjali, Sukhjit Singh Sehra, Jaiteg Singh . Policy Specification in Role based Access Control on Clouds. International Journal of Computer Applications. 75, 1 ( August 2013), 39-43. DOI=10.5120/13078-0253

@article{ 10.5120/13078-0253,
author = { Gitanjali, Sukhjit Singh Sehra, Jaiteg Singh },
title = { Policy Specification in Role based Access Control on Clouds },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 1 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number1/13078-0253/ },
doi = { 10.5120/13078-0253 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:44:41.192431+05:30
%A Gitanjali
%A Sukhjit Singh Sehra
%A Jaiteg Singh
%T Policy Specification in Role based Access Control on Clouds
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 1
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Nowadays researchers devoted their work access control method to enhance the security on Cloud. RBAC is attractive access model because the number of roles is significantly less hence users can be easily classified according to their roles. The Role-based Access Control (RBAC) model provides efficient way to manage access to information while reducing the cost of security administration and complexity in large networked applications. This paper specify various policies in RBAC on clouds such as migration policy which helps the user to migrate the database schema and roles easily to the Cloud using XML with more security. Restriction policy provide the security enhancement in Role Based Access Model by restricting the number of transaction per user and if the number of transactions will increase the admin will come to know through its monitoring system that unauthorized access has been made and it would be easier to take action against such happening. This paper proposes backup and restoration policy in Role Based Access Model in which if the main cloud is crashed or not working properly then the backup and restoration facility will be available to avoid the lost of important data. In this case chances of loss of data are very less so enhance more security on Cloud Computing.

References
  1. "Multi-tenancy architecture. " [Online]. Available: http://msdn. microsoft. com/en-us/library/aa479086. aspx.
  2. Abdul Raouf Khan ,"ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT," ARPN Journal of Engineering and Applied Sciences,VOL. 7, NO. 5,pp. 613-615,2012.
  3. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," IEEE Computer, pp. 38–47, 1996.
  4. "Rbac, role based access control 2000 workshop," Berlin, Germany, 2000.
  5. G. -J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur. , pp. 207–226, 2000.
  6. R. Sandhu, D. Ferraiolo, and R. Kuhn, "The nist model for role-based access control: towards a unified standard," in RBAC '00, 2000, pp. 47–63.
  7. R. Bhatti, E. Bertino, A. Ghafoor, and J. B. D. Joshi, "Xml-based specification for web services document security," Computer, pp. 41–49, 2004.
  8. J. Crampton and G. Loizou, "Administrative scope: A foundation for role-based administrative models," ACM Transactions on Information and System Security, pp. 201–231, 2003.
  9. A. Kern, M. Kuhlmann, R. Kuropka, and A. Ruthert, "A meta model for authorisations in application security systems and their integration into rbac administration," in SACMAT '04, 2004, pp. 87–96.
  10. M. Koch, L. V. Mancini, and F. Parisi-Presicce, "Administrative scope in the graph-based framework," in SACMAT '04, 2004, pp. 97–104.
  11. E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur. , vol. 4, no. 3, pp. 191–233, 2001.
  12. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A generalized temporal role-based access control model," IEEE Trans. on Knowl. And Data Eng. , vol. 17, no. 1, pp. 4–23, 2005.
  13. N. Li and M. V. Tripunitara, "Security analysis in role-based access control," ACM Trans. Inf. Syst. Secur. , pp. 391–420, 2006.
  14. C. Ramaswamy, R. Sandhu, R. Ramaswamy, and R. S, "Role-based access control features in commercial database management systems," in NIST-NCSC, 1998, pp. 503–511.
  15. M. Sloman, "Policy driven management for distributed systems," Journal of Network and Systems Management, pp. 333–360, 1994.
  16. Wei-Tek Tsai and Qihong Shao, "Role-Based Access-Control Using Reference Ontology in Clouds," 2011 Tenth International Symposium on Autonomous Decentralized Systems , pp. 121 - 128 ,2011.
  17. Gurleen Kaur,"Implementing XML-based Role and Schema Migration Scheme for Clouds,"International Journal of Engineering and Technology,Vol. 5, no. 1 ,pp. 221-225,2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Migration scheme Role-based Access Control Model Backup and Restoration Restriction policy