B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima
{"title":"An algebra for composing access control policies in cloud","authors":"B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima","doi":"10.1109/ICIICT.2015.7396067","DOIUrl":null,"url":null,"abstract":"The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"115 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Confernce on Innovation Information in Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT.2015.7396067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.