Abstract

AbstractIn Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments. When using the RBAC model in Cloud environments, some new elements should be considered. This pa- per proposes a SAT-RBAC model (security and availability based trust relationship in RBAC) and adopts the following elements as the main factors of a trust relationship: the security state and network avail- ability of the host used by a user, the protection state of the service providers that are related to the role. A security-based scheduling model for Cloud environments is presented. Because of the uncertainty of Cloud environments, the trust relationship is divided into three zones: the unbelievable zone, the prob- able believable zone and the believable zone. Bayesian method is used to estimate the trust probability distribution in the probable believable zone. This paper also provides algorithms ...

Highlights

  • In Cloud environments, the relationship between resources and users is more ad hoc and dynamic

  • Gomez-Baryolo et al developed an extension of the role-based access control (RBAC) model in multi domain environments, enabling the user to access various entities and fulfill many roles with the possibility of interacting with multiple resources, which is meaningful for Cloud environments that is full of different services [5]

  • This paper proposes a SAT-RBAC model, which integrates host security and network availability into the traditional RBAC model to resolve the complicated access control problems in Cloud environments

Read more

Summary

Introduction

In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. Kirkpatrick et al presented a novel framework for RBAC which prevents the user from disclosing sensitive location information when accessing a server [6] This framework is helpful for privacy preserving that is very important in Cloud environments. Tang et al proposed a new RBAC based access control model with two kinds of roles, in which users get credentials from owners to communicate with service provider and to get access permissions of resources [7]. This paper integrates the security state and the network availability of a host, along with the protection state of servers into the RBAC model and adopts these components as the basis of the trust relationship between users and roles in Cloud systems.

Definition
Access control using the trust degree
Computing the trust degree
Host security states
Host network availability
Server protection state
Experiments
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.