IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Access Control Framework for Cloud Computing

Access Control Framework for Cloud Computing
View Sample PDF
Author(s): Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia)and Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: 2019
Pages: 14
Source title: Cloud Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8176-5.ch035

Purchase

View Access Control Framework for Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access unauthorized resources. It is a mechanism which is very much important for protection in computer security. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC). All these models are known as identity based access control models. In all these access control models, user (subjects) and resources (objects) are identified by unique names. Identification may be done directly or through roles assigned to the subjects. These access control methods are effective in unchangeable distributed system, where there are only a set of Users with a known set of services. For this reason, we propose a framework which is well suited to many situations in cloud computing where users or applications can be clearly separated according to their job functions. In this chapter, we proposes a role based access control framework with various features including security of sensitive data, authorization policy and secure data from hackers. Our proposed role based access control algorithm provides tailored and fine level of user access control services without adding complexity, and supports access privileges updates dynamically when a user's role is added or updated.

Related Content

A. Ashwini, S. Balasubramaniam, Seifedine Kadry. © 2025. 26 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 20 pages.
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan. © 2025. 30 pages.
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar. © 2025. 22 pages.
Bhupinder Singh, Christian Kaunert. © 2025. 22 pages.
M. Abinaya. © 2025. 30 pages.
Dipti Chauhan, Jay Kumar Jain. © 2025. 28 pages.
Body Bottom