• DocumentCode
    652585
  • Title

    Secure Access to Cloud Resources

  • Author

    Musca, Constantin ; Ion, Andreea ; Leordeanu, Catalin ; Cristea, Valentin

  • Author_Institution
    Fac. of Autom. Control & Comput., Univ. Politeh. of Bucharest, Bucharest, Romania
  • fYear
    2013
  • fDate
    28-30 Oct. 2013
  • Firstpage
    554
  • Lastpage
    558
  • Abstract
    Cloud computing has developed into an ubiquitous distributed system model, offering services which range from storage to computing power or database infrastructure. The security aspect of such distributed systems is a very important and challenging issue. In this paper we propose a security solution which offers policy enforcement in order to detect denial of service attacks and to manage quota parameters of users registered in a cloud. We also present novel methods for controlling access suitable for cloud computing platforms which have high security requirements. Because cloud computing is a dynamic environment where the resources are allocated on demand and the users come and leave, a different approach must be taken. We analyze different access control models like Mandatory Access Control, Discretionary Access Control and Role-Based access control models and propose a model adapted to the Cloud Computing environment. Moreover, we investigate the cloud access control security issues and build a role-based access model that meets the cloud requirements. The proposed model inherits Role-Based Access Control features, but also has other features like temporal rights and constraints.
  • Keywords
    authorisation; cloud computing; computer network security; resource allocation; cloud access control security issues; cloud computing platform; cloud security requirements; denial of service attack detection; discretionary access control model; dynamic environment; mandatory access control model; policy enforcement; resource allocation; role-based access control model; role-based access model; ubiquitous distributed system model; user quota parameter management; Authorization; Cloud computing; Computational modeling; Computer crime; Time factors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on
  • Conference_Location
    Compiegne
  • Type

    conf

  • DOI
    10.1109/3PGCIC.2013.95
  • Filename
    6681289