TC-enabled and distributed cloud computing access control model
Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided ser...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
Asian Network for Scientific Information
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/35600/ http://scialert.net/abstract/?doi=jas.2014.620.630 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
id |
my.upm.eprints.35600 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.356002016-01-18T02:06:01Z http://psasir.upm.edu.my/id/eprint/35600/ TC-enabled and distributed cloud computing access control model Halboob, Waleed Mahmod, Ramlan Alghathbar, Khaled S. Mamat, Ali Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. Moreover, several access control issues have not been considered in cloud computing such as providing users with a temporal and delegable access. This paper proposed the design of a trusted and decentralized cloud computing access control model for better security and scalability. To address the scalability issue, the components of the proposed model are separated in such a way that they can be decentralized and executed in different extensible machines. The proposed model includes a Trusted XML-based Cloud Computing Policy Language (TXCCPL) that specifies access control policies for authenticating and authorizing both the user and his platform based on the Decentralized Trust Management (DTM) and Trusted Computing (TC) concepts. An Identity Based Encryption (IBE) is used for providing users with temporal and delegable access. Our analysis shows that the proposed model is cost-effectively distributed while avoiding the possible bottlenecks and, as a result, effectively scales with increased workloads. Also, using the DTM and TC concepts help on addressing several security challenges found in cloud computing. Asian Network for Scientific Information 2014 Article PeerReviewed Halboob, Waleed and Mahmod, Ramlan and Alghathbar, Khaled S. and Mamat, Ali (2014) TC-enabled and distributed cloud computing access control model. Journal of Applied Sciences, 14 (7). pp. 620-630. ISSN 1812-5654; ESSN: 1812-5662 http://scialert.net/abstract/?doi=jas.2014.620.630 10.3923/jas.2014.620.630 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
description |
Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. Moreover, several access control issues have not been considered in cloud computing such as providing users with a temporal and delegable access. This paper proposed the design of a trusted and decentralized cloud computing access control model for better security and scalability. To address the scalability issue, the components of the proposed model are separated in such a way that they can be decentralized and executed in different extensible machines. The proposed model includes a Trusted XML-based Cloud Computing Policy Language (TXCCPL) that specifies access control policies for authenticating and authorizing both the user and his platform based on the Decentralized Trust Management (DTM) and Trusted Computing (TC) concepts. An Identity Based Encryption (IBE) is used for providing users with temporal and delegable access. Our analysis shows that the proposed model is cost-effectively distributed while avoiding the possible bottlenecks and, as a result, effectively scales with increased workloads. Also, using the DTM and TC concepts help on addressing several security challenges found in cloud computing. |
format |
Article |
author |
Halboob, Waleed Mahmod, Ramlan Alghathbar, Khaled S. Mamat, Ali |
spellingShingle |
Halboob, Waleed Mahmod, Ramlan Alghathbar, Khaled S. Mamat, Ali TC-enabled and distributed cloud computing access control model |
author_facet |
Halboob, Waleed Mahmod, Ramlan Alghathbar, Khaled S. Mamat, Ali |
author_sort |
Halboob, Waleed |
title |
TC-enabled and distributed cloud computing access control model |
title_short |
TC-enabled and distributed cloud computing access control model |
title_full |
TC-enabled and distributed cloud computing access control model |
title_fullStr |
TC-enabled and distributed cloud computing access control model |
title_full_unstemmed |
TC-enabled and distributed cloud computing access control model |
title_sort |
tc-enabled and distributed cloud computing access control model |
publisher |
Asian Network for Scientific Information |
publishDate |
2014 |
url |
http://psasir.upm.edu.my/id/eprint/35600/ http://scialert.net/abstract/?doi=jas.2014.620.630 |
_version_ |
1643831501882654720 |