DocumentCode
652585
Title
Secure Access to Cloud Resources
Author
Musca, Constantin ; Ion, Andreea ; Leordeanu, Catalin ; Cristea, Valentin
Author_Institution
Fac. of Autom. Control & Comput., Univ. Politeh. of Bucharest, Bucharest, Romania
fYear
2013
fDate
28-30 Oct. 2013
Firstpage
554
Lastpage
558
Abstract
Cloud computing has developed into an ubiquitous distributed system model, offering services which range from storage to computing power or database infrastructure. The security aspect of such distributed systems is a very important and challenging issue. In this paper we propose a security solution which offers policy enforcement in order to detect denial of service attacks and to manage quota parameters of users registered in a cloud. We also present novel methods for controlling access suitable for cloud computing platforms which have high security requirements. Because cloud computing is a dynamic environment where the resources are allocated on demand and the users come and leave, a different approach must be taken. We analyze different access control models like Mandatory Access Control, Discretionary Access Control and Role-Based access control models and propose a model adapted to the Cloud Computing environment. Moreover, we investigate the cloud access control security issues and build a role-based access model that meets the cloud requirements. The proposed model inherits Role-Based Access Control features, but also has other features like temporal rights and constraints.
Keywords
authorisation; cloud computing; computer network security; resource allocation; cloud access control security issues; cloud computing platform; cloud security requirements; denial of service attack detection; discretionary access control model; dynamic environment; mandatory access control model; policy enforcement; resource allocation; role-based access control model; role-based access model; ubiquitous distributed system model; user quota parameter management; Authorization; Cloud computing; Computational modeling; Computer crime; Time factors;
fLanguage
English
Publisher
ieee
Conference_Titel
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on
Conference_Location
Compiegne
Type
conf
DOI
10.1109/3PGCIC.2013.95
Filename
6681289
Link To Document