PCM in cloud

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Granular Computing, GrC 2014
EditorsYasuo Kudo, Shusaku Tsumoto
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-206
Number of pages6
ISBN (Electronic)9781479954643
DOIs
Publication statusPublished - 11 Dec 2014
Event2014 IEEE International Conference on Granular Computing, GrC 2014 - Hokkaido, Japan
Duration: 22 Oct 201424 Oct 2014

Publication series

NameProceedings - 2014 IEEE International Conference on Granular Computing, GrC 2014

Conference

Conference2014 IEEE International Conference on Granular Computing, GrC 2014
Country/TerritoryJapan
CityHokkaido
Period22/10/1424/10/14

Keywords

  • Profile centric modeling
  • SBaaS
  • access control
  • complexity
  • graph
  • security

Fingerprint

Dive into the research topics of 'PCM in cloud'. Together they form a unique fingerprint.

Cite this