TY - GEN
T1 - AR-ABAC
T2 - 1st IEEE International Conference on Collaboration and Internet Computing, CIC 2015
AU - Riad, Khaled
AU - Yan, Zhu
AU - Hu, Hongxin
AU - Ahn, Gail-Joon
N1 - Publisher Copyright: © 2015 IEEE.
PY - 2016/3/1
Y1 - 2016/3/1
N2 - One of the most important challenges that have threatened cloud computing and caused its slow adoption is security. Since clouds have diverse groups of users with different sets of security requirements, restricting the users' accesses and protecting information from unauthorized accesses have become the most difficult tasks. To address these critical challenges, in this paper we first formalize Attribute Based Access Control (ABAC) and propose a new access control model, called Attribute-Rule ABAC (AR-ABAC), for cloud computing to meet critical access control requirements in clouds. Our model supports the attribute-rules that deal with the association between users and objects, as well as the capability for accessing objects based on their sensitivity levels. The attribute-rules specify an agreement that determines what kind of attributes should be used and the number of attributes considered for making access decisions. In addition, our model ensures secure resource sharing among potential untrusted tenants and supports different access permissions to the same user at the same session.
AB - One of the most important challenges that have threatened cloud computing and caused its slow adoption is security. Since clouds have diverse groups of users with different sets of security requirements, restricting the users' accesses and protecting information from unauthorized accesses have become the most difficult tasks. To address these critical challenges, in this paper we first formalize Attribute Based Access Control (ABAC) and propose a new access control model, called Attribute-Rule ABAC (AR-ABAC), for cloud computing to meet critical access control requirements in clouds. Our model supports the attribute-rules that deal with the association between users and objects, as well as the capability for accessing objects based on their sensitivity levels. The attribute-rules specify an agreement that determines what kind of attributes should be used and the number of attributes considered for making access decisions. In addition, our model ensures secure resource sharing among potential untrusted tenants and supports different access permissions to the same user at the same session.
KW - Access control models
KW - Attribute based access control
KW - Cloud computing security
UR - https://www.scopus.com/pages/publications/84964835379
UR - https://www.scopus.com/pages/publications/84964835379#tab=citedBy
U2 - 10.1109/CIC.2015.38
DO - 10.1109/CIC.2015.38
M3 - Conference contribution
T3 - Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015
SP - 28
EP - 35
BT - Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 28 October 2015 through 30 October 2015
ER -