Author:
Abdelfattah Doaa,Hassan Hesham A.,Omara Fatma A.
Abstract
AbstractThe collaboration among different organizations is considered one of the main benefits of moving applications and services to a cloud computing environment. Unfortunately, this collaboration raises many challenges such as the access of sensitive resources by unauthorized people. Usually, Role-Based Access-Control (RBAC) model is deployed in large organizations. This paper addresses the scalability problem of the online stored rules. This problem affects the performance of the access control system due to increasing number of shared resources and/or number of collaborating organizations in the same cloud environment. Therefore, this paper proposes replacing the cross-domain RBAC rules with Role-To-Role (RTR) mapping rules among all organizations. The RTR mapping rules are generated using a newly proposed Role-Mapping algorithm. A comparative study is performed to evaluate the proposed algorithm’s performance with concerning the Rule-Store size and the authorization response time. According to the results, it is found that the proposed algorithm reduces the number of stored rules which minimizes the Rule-Store size and reduces the authorization response time. Additionally, this paper proposes applying a concurrent approach on the RTR mapping model using the proposed Role-Mapping algorithm to achieve more savings in the authorization response time. Therefore, it will be suitable in highly-collaborative cloud environments.
Publisher
Springer Science and Business Media LLC
Subject
Information Systems and Management,Hardware and Architecture,Information Systems,Software
Reference40 articles.
1. Wang, L., et al.: Cloud computing: a perspective study. N. Gener. Comput. 28(2), 137–146 (2010). https://doi.org/10.1007/s00354-008-0081-5
2. Office of Management and Budget, “Federal cloud computing strategy,” Office of Management and Budget, 2019. https://cloud.cio.gov/. Accessed 1 May 2019
3. Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In 2010 IEEE 3rd international conference on cloud computing, pp. 268–275 (2010). https://doi.org/10.1109/CLOUD.2010.62
4. Gopalan, G., Negi, A., Sastry, V.N.: A cross-domain role mapping and authorization framework for RBAC in grid systems. Int. J. Comput. Sci. Appl. 6(1), 1–12 (2009)
5. Kaur, U., Singh, D.: Comparative analysis of access control models. Int. J. Comput. Trends Technol. 29(3), 132–135 (2015). https://doi.org/10.14445/22312803/IJCTT-V29P123
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献