Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0974-7710
Online ISSN:
0974-7729


  About IJWA
  Aims & Scope
Editorial Board
Contact us
Current Issue
Next Issue
Previous Issue
Sample Issue
Be a Reviewer
Publisher
Subscription
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of E-Technology(JET)

 

 
International Journal of Web Applications

Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents
Zeineb Ben Yahya, Farah Barika Ktata, Khaled Ghedira
National School of Computer Science of Tunisia (ENSI) University of Manouba Tunisia
Abstract: Cloud services are designed to provide scalable access to applications, resources and services, and are fully managed by cloud service providers. On-demand cost-effective services are offered such as software as a service, infrastructure as a service and platform as a service. Despite the promising facilities and benefits of these services, most organizations and companies are worried about accepting to use them due to security issues and challenges within the cloud like data security, abuse of cloud services, malicious insiders and cyber-attacks. In order to fulfill organization data security requirements, protect organization assets and win the trust of cloud service consumers, models should be designed to solve organizational and distributed aspects of information usage stored in a cloud and to protect them against unauthorized access and modification. However, various access control models have been developed such as: role-based models, attribute-based encryption models and multi-tenancy models. In spite of such model diversity, cloud dynamic and distributed access control requirements may not be fulfilled, for several reasons: (i) the user-resource relationship is dynamic in the cloud. (ii) Service providers and users are typically not in the same security domain. (iii) The multi-tenant hosting and heterogeneity of security policies. In this paper, a novel access control model using the technology of mobile agents for cloud computing is presented to meet the distributed access control requirements. It aims to protect the sensitive data of cloud service consumers, to guarantee the availability of cloud service providers’ as well as the confidentiality and integrity of costumers’ data and to secure sharing resources.
Keywords: Cloud Computing Security, Cloud Service Provider, Distributed Access Control Models, Mobile Agents Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents
DOI:https://doi.org/10.6025/ijwa/2020/12/1/1-15
Full_Text   PDF 599 KB   Download:   86  times
References:

[1] Cloud Security Alliance Guidance Version 3.0. (2011), https://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[2] Safiriyu, E., Olatunde, A., Ayodeji, O. (2011). A User Identity Management Protocol for Cloud Computing Paradigm, Int. J.
Communications, Network and System Sciences, 2011, 4, 152-163
[3] Zhang, Xuan., Wuwong, Nattapong., Li, Hao. (2010). Information Security Risk Management Framework for the Cloud
Computing Environments, 10th IEEE Int. Conf. on Computer and Information Technology CTI 2010.
[4] Min, Y.G., Bang, Y. H. (2012). Cloud Computing Security Issues and Access Control Solutions, Journel of Security Engineering,
volume 2, 2012.
[5] Khan, A. R. (2012). Access Control in Cloud Computing Environment, ARPN Journal of Engineering and Applied Sciences,
7 (5) MAY 2012
[6] Yahya, Zeineb Ben., BarikaKtata, Farah., Ghédira, Khaled (2017). MA-MOrBAC: A Distributed Access Control Model Based
on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. CRiSIS 2017. 101-114
[7] Ferber, J. (1999). Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence. Addison – Wesley.
[8] Tang, Zhuo., Zhang, Shaohua, Li, Kenli., Feng, Benming. (2010). Security Analysis and Validation for Access Control in
Multi-domain Environment based on Risk, Information Security, Practice and Experience, LNCS, Vol. 6047, 2010, p 201-206
[9] Sandhu, R. S., Samarati, P. (1994). Access controls, principles and practice. IEEE Communications Magazine, 32 (9), p40-48, 1994.
[10] Wang, Z. (2011). Security and privacy issues within the cloud computing. In: 2011 International Conference on Computational
and Information Sciences. IEEE; 2011. p 175e8. http://dx.doi.org/ 10.1109/ICCIS.2011.247.
[11] Dan Hubbard, W., Michael Sutton, Z. (2012). Top threats to cloud computing V1.0. Cloud Security Alliance; 2010. Retrieved
June 20, 2012, from, https://cloudsecurityalliance.org/topthreats/ csathreats.v1.0.pdf
[12] Wang, C., Wang, Q., Ren, K., Lou, W. (2009). Ensuring data storage security in cloud computing. In: 2009 17th International
Workshop on Quality of Service. IEEE; 2009. p 1e9. http://dx.doi.org/10.1 109/IWQoS.2009.5201385.
[13] Subashini, S., Kavitha, V. A. (2011). Survey on security issues in service delivery models of cloud computing. J Netw
Comput Appl 2011, 34 (1) 1e11. http://dx.doi.org/10.1016/j.jnca.2010.07.006.
[14] Lombardi F., Di Pietro R. (2011). Secure virtualization for cloud computing. J Netw Comput Appl 2011, 34 (4) 1113e22. http:/
/ dx.doi.org/10.1016/j.jnca.2010.06.008.
[15] Choudhury, AJ., Kumar, P., Sain, M., Lim, H., Jae-Lee H. (2011). A strong user authentication framework for cloud computing.
In: 2011 IEEE Asia-Pacific Services Computing Conference. IEEE; 2011. p 110e5. http://dx.doi.org/10.1109/APSCC.2011.14
[16] Keromytis, AD, Smith, JM. (2007). Requirements for scalable access control and security management architectures. ACM
Trans Internet Technol 2007, 7 (2) 22. http://dx.doi.org/10.1145/1239 971.1239972.
[17] Crago, S., Dunn, K., Eads, P., Hochstein, L., Kang, D-I., Kang, M., et al. (2011). Heterogeneous cloud computing. In: 2011
IEEE International Conference on Cluster Computing. IEEE; 2011. p. 378e85. http://dx.doi.org/10.1109/CLUSTER.2011.49.
[18] Patil, V., Mei, A., Mancini, L. (2007). Addressing interoperability issues in access control models. In: ASIACCS ’07 Proceedings
of the 2nd ACM symposium on Information, computer and communications security, vol. 389-391; 2007. Retrieved from,
http://dl.acm.org/citation.cfm?id¼1229337; 2007.
[19] Almutairi, A., Sarfraz, M., Basalamah, S. (2012). A distributed access control architecture for cloud computing. Softw IEEE
2012, 29(2):36e44. Retrieved from, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arn umber¼6095492.
[20] Hasebe, K., Mabuchi, M., Matsushita, A. (2010). Capability-based delegation model in RBAC. In: Proceeding of the 15th
ACM symposium on Access control models and technologies e SACMAT ’10. New York, New York, USA: ACM Press; 2010. p
109e18. http:// dx.doi.org/10.1145/1809842.1809861.
[21] Kuhn, D. F. (1992). Role-Based Access Controls. 15th National Computer Security Conference, 554 - 563.
[22] Suhendra, V. (2011). A survey on access control deployment. SecurTechnol 2011, 259:11e20. Retrieved from,
[23] Munawer, Q. (2000). Administrative models for role-based access control. George Mason University; 2000. Retrieved from,
http://citesee rx.ist.psu.edu/viewdoc/download?doi¼10.1.1.92.9150&rep¼r ep1&type¼pdf.
[24] Almutairi, M. I., Sarfraz, S., Basalamah, W. G. Aref Ghafoor, A. (2012). A Distributed Access Control Architecture for Cloud
Computing, IEEE Software, 29 (2) March-April 2012
[25] Ruj, S., Nayak, A., Stojmenovic, I. (2011). DACC: Distributed Access Control in Clouds, In: Proceedings of the 10th IEEE International
Conference on Trust, Security and Privacy in Computing and Communications, p 91-98, 2011.
[26] Al-Kahtani MA, Sandhu R. (2002). A model for attribute-based user-role assignment. In: 18th Annual Computer Security
Applications Conference, 2002. In: Proceedings. IEEE Comput. Soc.; 2002, 353e62. http://dx.doi.org/10.1109/CSAC.2002.1176307.
[27] Karp, A., Haury, H., Davis, M. (2009). From ABAC to ZBAC: the evolution of access control models. HP Laboratories-2009-
30; 2009. Retrieved from, http://www.hpl.hp.com/techreports/2009/HP L-2009-30.pdf?jumpid¼reg_R1002_USEN.
[28] Brucker, A., Bru¨ gger, L., Kearney, P., Wolff , B. (2011). An approach to modular and testable security models of real-world
health-care applications. In: SACMAT’11. Proceedings of the 16th ACM symposium on Access Control Models and
Technologies.133e42. Retrieved from, http://dl.acm.org/citation.cfm? id¼1998461; 2011;
[29] Suhendra V. (2011). A survey on access control deployment. SecurTechnol 2011; 259:11e20. Retrieved from, http://www.spring
erlink.com/index/J31010242555W867.pdf.
[30] Varsha, D., Mali, Patil, Pramod. (2011). Authentication and Access Control for Cloud Computing using RBDAC Mechanism, International Journal of Innovative Research in Computer and Communication Engineering, 4 (11), November 20 16,
DOI: 10.15680/IJIRCCE. 2 016
[31] Shantanu Pal, Khatua, Sunirmal., Chaki, Nabendu., Sanyal, Sugata(2012). A New Trusted and Collaborative Agent Based
Approach for Ensuring Cloud Security; Annals of Faculty Engineering Hunedoara International Journal of Engineering; 10
(1) February, 2012. p 71-78. ISSN: 1584-2665.
[32] Almenarez, Florina., Marin, Andrés., Campo, Celeste., Carlos. (2004). PTM: A Pervasive Trust Management Model for
Dynamic Open Environments, Proceedings of First Workshop on Pervasive Security, Privacy and Trust PSPT’04, Boston, USA,
2004.
[33] Priyank, S., Ranjita, S., Mukul, S. (2011). Security Agents: A Mobile Agent based Trust Model for Cloud Computing,
International Journal of Computer Applications (0975 – 8887) 36 (12) December 2011.
[34] Alwesabi, A., Okba, K. (2014). Security Method: Cloud Computing Approach Based on Mobile Agents. International
Journal of New Computer Architectures and their Applications (IJNCAA), 4 (1) 17- 29.
[35] Ali, Alwesabi., Abdullah, Almutewekel. (2013). Implementation of Cloud Computing Approach Based on Mobile
Agents,”.Computer science department, university of Batna, Algeria Batna, Algeria, International Journal of Computer and
Information Technology (ISSN: 2279 – 0764) 02 (06) November 2013
[36] Standard, Nist-Fips. (2001). Announcing the ADVANCED ENCRY PTION STANDARD (AES), Federal Information Processing
Standards Publication 197, NIST, 2001.
[37] Li, W., Wan, H. (2012). A refined RBAC model for cloud computing. In: 2012 IEEE/ACIS 11th International Conference on
Computer and Information Science. IEEE; 2012. p 43e8. http://dx.doi.org/ 10.1109/ICIS.2012.13.
[38] Andal Jayaprakash, H., HadiGunes, M. (2011). Ensuring access control in cloud provisioned healthcare systems. In:
Consumer Communications and Networking Conference (CCNC), 2011 IEEE. p 247e51. Retrieved from, http://ieeexplore.ieee.org/
xpls/abs_all.jsp?arnumber¼5766466; 2011.
[39] Tsai, W-T, Shao, Q. (2011). Role-based access-control using reference ontology in clouds. In: 2011 Tenth International
Symposium on Autonomous Decentralized Systems, vol. 2. IEEE; 2011. p 121e8. http://dx.doi.org/10.1109/ISADS.2011.21


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2010 dline.info