DocumentCode :
660811
Title :
ACaaS: Access Control as a Service for IaaS Cloud
Author :
Ruoyu Wu ; Xinwen Zhang ; Gail-Joon Ahn ; Sharifi, H. ; Haiyong Xie
Author_Institution :
Arizona State Univ., Tempe, AZ, USA
fYear :
2013
fDate :
8-14 Sept. 2013
Firstpage :
423
Lastpage :
428
Abstract :
Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and fine-grained access control mechanism, in order to meet dynamic, extensible, and highly configurable security requirements of these cloud consumers. However, existing security mechanisms provided by IaaS cloud providers do not satisfy these requirements. To address such an emergent demand, we propose a new cloud service called access control as a service (ACaaS), a service-oriented architecture in cloud to support multiple access control models, with the spirit of plug gable access control modules in modern operating systems. As a proof-of-concept reference prototype, we design and implement ACaaS_RBAC to provide role-based access control (RBAC) for Amazon Web Services (AWS), where cloud customers can easily integrate the service into enterprise applications in order to extend RBAC policy enforcement in AWS.
Keywords :
Web services; authorisation; cloud computing; outsourcing; service-oriented architecture; ACaaS_RBAC; AWS; Amazon Web Services; IaaS cloud environment; IaaS cloud providers; RBAC policy enforcement; access control as a service; cloud consumers; cloud service; computation outsourcing; dynamic security requirements; enterprise application; extensible security requirements; fine-grained access control mechanism; highly configurable security requirements; infrastructure-as-a-service based cloud platform; modern operating systems; multiple access control models; pluggable access control modules; role-based access control; service-oriented architecture; storage outsourcing; workflow outsourcing; Access control; Cloud computing; Computational modeling; Computer architecture; Organizations; access control; cloud computing; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Social Computing (SocialCom), 2013 International Conference on
Conference_Location :
Alexandria, VA
Type :
conf
DOI :
10.1109/SocialCom.2013.66
Filename :
6693363
Link To Document :
بازگشت