IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Access Control Framework for Cloud Computing

Access Control Framework for Cloud Computing
View Sample PDF
Author(s): Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: 2015
Pages: 12
Source title: Handbook of Research on Security Considerations in Cloud Computing
Source Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
DOI: 10.4018/978-1-4666-8387-7.ch015

Purchase

View Access Control Framework for Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access unauthorized resources. It is a mechanism which is very much important for protection in computer security. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC). All these models are known as identity based access control models. In all these access control models, user (subjects) and resources (objects) are identified by unique names. Identification may be done directly or through roles assigned to the subjects. These access control methods are effective in unchangeable distributed system, where there are only a set of Users with a known set of services. For this reason, we propose a framework which is well suited to many situations in cloud computing where users or applications can be clearly separated according to their job functions. In this chapter, we proposes a role based access control framework with various features including security of sensitive data, authorization policy and secure data from hackers. Our proposed role based access control algorithm provides tailored and fine level of user access control services without adding complexity, and supports access privileges updates dynamically when a user's role is added or updated.

Related Content

Zaigham Mahmood. © 2021. 18 pages.
Zaigham Mahmood. © 2021. 17 pages.
Atakan Gerger. © 2021. 31 pages.
Kemi Ogunsola, Temilade Precious Olojo. © 2021. 27 pages.
Leu Fang Yie, Heru Susanto, Desi Setiana. © 2021. 18 pages.
Muthu Ramachandran, Pethuru Raj Chelliah, P. Beaulah Soundarabai. © 2021. 23 pages.
Natalija Najdova, Jasmina Belchovska Tasevska, Smilka Janeska Sarkanjac, Branislav Sarkanjac, Dimitar Trajanov. © 2021. 26 pages.
Body Bottom