PCM in cloud

Abstract :

Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service. Published in:

Complete list of metadatas

https://hal.telecom-paristech.fr/hal-02288436
Contributor : Telecomparis Hal <>
Submitted on : Saturday, September 14, 2019 - 6:48:46 PM
Last modification on : Monday, September 23, 2019 - 3:57:12 PM

Identifiers

  • HAL Id : hal-02288436, version 1

Collections

Citation

Mounira Msahli, Ahmed Serhrouchni. PCM in cloud. IEEE International Conference on Granular Computing (GrC), Oct 2014, Noboribetsu, Japan. ⟨hal-02288436⟩

Share

Metrics

Record views

5