Title :
ACaaS: Access Control as a Service for IaaS Cloud
Author :
Ruoyu Wu ; Xinwen Zhang ; Gail-Joon Ahn ; Sharifi, H. ; Haiyong Xie
Author_Institution :
Arizona State Univ., Tempe, AZ, USA
Abstract :
Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and fine-grained access control mechanism, in order to meet dynamic, extensible, and highly configurable security requirements of these cloud consumers. However, existing security mechanisms provided by IaaS cloud providers do not satisfy these requirements. To address such an emergent demand, we propose a new cloud service called access control as a service (ACaaS), a service-oriented architecture in cloud to support multiple access control models, with the spirit of plug gable access control modules in modern operating systems. As a proof-of-concept reference prototype, we design and implement ACaaS_RBAC to provide role-based access control (RBAC) for Amazon Web Services (AWS), where cloud customers can easily integrate the service into enterprise applications in order to extend RBAC policy enforcement in AWS.
Keywords :
Web services; authorisation; cloud computing; outsourcing; service-oriented architecture; ACaaS_RBAC; AWS; Amazon Web Services; IaaS cloud environment; IaaS cloud providers; RBAC policy enforcement; access control as a service; cloud consumers; cloud service; computation outsourcing; dynamic security requirements; enterprise application; extensible security requirements; fine-grained access control mechanism; highly configurable security requirements; infrastructure-as-a-service based cloud platform; modern operating systems; multiple access control models; pluggable access control modules; role-based access control; service-oriented architecture; storage outsourcing; workflow outsourcing; Access control; Cloud computing; Computational modeling; Computer architecture; Organizations; access control; cloud computing; security;
Conference_Titel :
Social Computing (SocialCom), 2013 International Conference on
Conference_Location :
Alexandria, VA
DOI :
10.1109/SocialCom.2013.66