TY - GEN
T1 - PCM in cloud
AU - Msahli, Mounira
AU - Serhrouchni, Ahmed
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/11
Y1 - 2014/12/11
N2 - Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service.
AB - Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service.
KW - Profile centric modeling
KW - SBaaS
KW - access control
KW - complexity
KW - graph
KW - security
UR - https://www.scopus.com/pages/publications/84920719418
U2 - 10.1109/GRC.2014.6982835
DO - 10.1109/GRC.2014.6982835
M3 - Conference contribution
AN - SCOPUS:84920719418
T3 - Proceedings - 2014 IEEE International Conference on Granular Computing, GrC 2014
SP - 201
EP - 206
BT - Proceedings - 2014 IEEE International Conference on Granular Computing, GrC 2014
A2 - Kudo, Yasuo
A2 - Tsumoto, Shusaku
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE International Conference on Granular Computing, GrC 2014
Y2 - 22 October 2014 through 24 October 2014
ER -