CFP last date
20 May 2024
Reseach Article

EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing

by Khaled Riad, Zhu Yan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 14
Year of Publication: 2015
Authors: Khaled Riad, Zhu Yan
10.5120/ijca2015907649

Khaled Riad, Zhu Yan . EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing. International Journal of Computer Applications. 132, 14 ( December 2015), 9-17. DOI=10.5120/ijca2015907649

@article{ 10.5120/ijca2015907649,
author = { Khaled Riad, Zhu Yan },
title = { EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 14 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number14/23660-2015907649/ },
doi = { 10.5120/ijca2015907649 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:22.503990+05:30
%A Khaled Riad
%A Zhu Yan
%T EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 14
%P 9-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the distinguished nature of cloud computing, it needs an effective access control model, that can cope with its broad network access, on-demand self-service, and so on. When thinking in integrating the Software-defined Networking (SDN) with the cloud computing environment, to let SDN serve, secure, and control the cloud environment. The authors must think about a perfect access control model to secure access to the SDN-integrated cloud environment. This paper proposes an extended access control model for the SDN-integrated cloud computing. Where the author’s AR-ABAC access control model [15] is extended to suit the SDN-integrated cloud environment distinguished nature. The extended model can make the election process about the number of attributes considered for making access decisions. In addition it can perfectly deal with the SDN software controllers (OpenDaylight controller). Finally the model ensures secure resource sharing among potential untrusted tenants and supports different access permissions to the same user at the same session.

References
  1. M.A. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. In 18th Annual Computer Security Applications Conference, 2002. Proceedings, pages 353–362, 2002.
  2. D. Bell and Len LaPadula. Secure computer systems: mathematical foundations. Bedford, MA. Retrieved February 04, 2013, from: Secure computer systems: mathematical foundations; 1973.
  3. Achim D. Brucker, Lukas Br¨ugger, Paul Kearney, and Burkhart Wolffy. An approach to modular and testable security models of real-world health-care applications. In SACMAT’ 11. Proceedings of the 16th ACM symposium on Access Control Models and Technologies, pages 133–142. SACMAT, 2011.
  4. S. Crago, K. Dunn, P. Eads, L. Hochstein, Dong-In Kang, Mikyung Kang, D. Modium, K. Singh, Jinwoo Suh, and J. P. Walters. Heterogeneous cloud computing. In 2011 IEEE International Conference on: Cluster Computing (CLUSTER), pages 378–385, September 2011.
  5. Project Floodlight: Open Source Software for Building Software-Defined Networks. Available online: http://www.projectfloodlight.org/floodlight/. (accessed on 6 December 2015).
  6. S. Harris. Mike meyers cissp(r) certification passport. first edition. United States: McGraw-Hill, page 422, 2002.
  7. Xin Jin, Ram Krishnan, and Ravi Sandhu. Data and Applications Security and Privacy XXVI, volume 7371 of Lecture Notes in Computer Science, chapter A Unified Attribute- Based Access Control Model Covering DAC, MAC and RBAC, pages 41–55. Springer Berlin Heidelberg, 2012.
  8. ButlerW. Lampson and Palo Alto. Acm sigops operating systems review. SIGOPS ACM Special Interest Group on Operating Systems, ACM New York, NY, USA, 8(1):18–24, 1974.
  9. Peter Mell and Timothy Grance. The nist definition of cloud computing. Special Publication 800-145, U.S. Department of Commerce, October 2012. National Institute of Standards and Technology.
  10. Ei Ei Mon and Thinn Thu Naing. The privacy-aware access control system using attribute-and role-based access control in private cloud. In 4th IEEE International Conference on: Broadband Network and Multimedia Technology (IC-BNMT), pages 447–451, October 2011.
  11. H. A. J. Narayanan and M. H. Giine. Ensuring access control in cloud provisioned healthcare systems. In Consumer Communications and Networking Conference (CCNC), 2011 IEEE, pages 247–251, January 2011.
  12. OpenDaylight (ODL). Available online: http://www.opendaylight.org/. (accessed on 6 December 2015).
  13. Open Networking Foundation (ONF). Available online: https://www.opennetworking.org. (accessed on 6 December 2015).
  14. OpenStack. Available online: https://www.openstack.org/. (accessed on 6 December 2015).
  15. Khaled Riad, Zhu Yan, Hongxin Hu, and Gail-Joon Ahn. Arabac: A new attribute based access control model supporting attribute-rules for cloud computing. In 2015 IEEE International Conference on Collaboration and Internet Computing (CIC 2015), pages 28–35, October 2015.
  16. Pierangela Samarati and Sabrina Capitani de Vimercati. Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, chapter Access Control: Policies, Models, and Mechanisms, pages 137–196. Springer Berlin Heidelberg, 2001.
  17. R. Sandhu, D. Ferraiolo, and R. Kuhn. The nist model for role-based access control: Towards a unified standard. In 5th ACM Workshop on Role-Based Access Control, pages 47–63. ACM, July 2000.
  18. Lili Sun, HuaWang, Jianming Yong, and GuoxinWu. Semantic access control for cloud computing based on e-healthcare. In 16th International Conference on: Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE, pages 512–518, May 2012.
  19. Zhu Tianyi, Liu Weidong, and Song Jiaxing. An efficient role based access control system for cloud computing. In 11th International Conference on: Computer and Information Technology (CIT), 2011 IEEE, pages 97–102, Augest 2011.
  20. Wei-Tek Tsai and Qihong Shao. Role-based access-control using reference ontology in clouds. In 10th International Symposium on: Autonomous Decentralized Systems (ISADS), pages 121–128, March 2011.
  21. Wenhui Wang, Jing Han, Meina Song, and Xiaohui Wang. The design of a trust and role based access control model in cloud computing. In 6th International Conference on: Pervasive Computing and Applications (ICPCA), pages 330–334, October 2011.
  22. Younis A. Younis, Kashif Kifayat, and Madjid Merabti. An access control model for cloud computing. Journal of Information Security and Applications, 19(1):45 – 60, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing security software defined networking attribute based access control