Open Access
Subscription Access
Multi-Tenant Endorsement using Linguistic Model for Cloud Computing
Cloud computing is actually a developing ideal to provide on-demand IT services to end-users. The get accesses to command to information situated in the cloud is just one of the essential parts to enable service to change right into the cloud. Some latest works offer access management models ideal for the cloud; nonetheless, there are essential shortages that need to be resolved in this field. This work offers a progression in the state-of the-craft to get access to management for cloud processing. We illustrate a higher meaningful consent version that permits the management of state-of-the-art attributes such as role-based to get access to management (RBAC), hierarchical RBAC (hRBAC), relative RBAC (cRBAC) and also ordered objects (HO). The get access to management design takes benefit of the logic formalism delivered due to the Semantic Internet technologies to designate both the ischolar_maining framework and also the certification style, as well as the rules worked with to guard the get access to sources in the cloud. The access control style has actually been specially established taking into consideration the multi-tenancy model of this type of environment. Moreover, this rely on a style that allows a powdery meaning of what information is on call for every specific tenant has been actually illustrated. This multi-tenant endorsement model permits a fine-grained definition of information sets is being available for the individual tenants. Certainly this assures formation of business associations among cloud tenants resulting in confederation and association agreements. The suggested model has actually been confirmed via verification of concept implementation of the gain access to management device for OpenStack along with promising efficiency end results.
Keywords
Endorsement, Linguistic, Classical Objects, Access Rights.
User
Font Size
Information
- . J.M.M. Perez, J.B. Bernabe, J.M. Alcaraz-Calero, F.J.G. Clemente, G.M. Perez, A.F.G. Skarmeta, Semantic-aware authorization architecture for grid security, Future Generation Computer Systems 27 (2011) 40–55.
- . X.-Y. Li, Y. Shi, W.M. Yu-Guo, Multi-tenancy based access control in cloud, in: IEEE (Ed.), 2010 International Conference on Computational Intelligenceand Software Engineering, vol. 1, IEEE, 2010, pp. 1–4.
- . D. Li, C. Liu, Q. Wei, Z. Liu, B. Liu, RBACbased access control for SaaS systems, in: IEEE (Ed.), 2010 2nd International Conference on Information Engineering and Computer Science, IEEE, 2010, pp. 1–4.
- . J. Xu, T. Jinglei, H. Dongjian, Z. Linsen, C. Lin, N. Fang, Research and implementation on access control of management-type SaaS, in: IEEE (Ed.),The 2nd IEEE International Conference on Information Management and Engineering, IEEE, 2010, pp. 388–392.
- . Sirisha, G.G. Kumari, API access control in cloud using the role based access control model, in: IEEE (Ed.), Trends in Information Sciences & Computing, IEEE, 2010, pp. 135–137.
- . Foster, Y. Zhao, I. Raicu, S. Lu, Cloud computing and grid computing 360° compared, in: Grid Computing Environments Workshop, IEEE, 2008, pp. 1–10.
- . J.M. Alcaraz-Calero, G.M. Perez, A.F.G. Skarmeta, Towards an authorization model for distributed systems based on the semantic web, IET Information Security 4 (4) (2010) 411–421.
- . A.L. Pereira, RBAC for high performance computing systems integration in grid computing and Cloud computing, in: IEEE (Ed.), IEEE International Parallel & Distributed Processing Symposium, IEEE, 2011, pp. 914–921.
- . W.-T. Tsai, Q. Shao, Role-based access-control using reference ontology in clouds, in: IEEE (Ed.), Tenth International Symposium on Autonomous Decentralized, IEEE, 2011, pp. 121–128.
- . J.M. Alcaraz-Calero, N. Edwards, J. Kirschnick, L. Wilcock, M. Wray, Towards a multi-tenancy authorization system for cloud services, IEEE Security and Privacy 8 (6) (2010) 48–55.
- . J.B. Bernabe, J.M.M. Perez, J.M.A. Calero, F.J.G. Clemente, G.M. Perez, A.F.G. Skarmeta, Towards an authorization system for cloud infrastructure providers, in: International Conference on Security and Cryptography, 2006 pp. 333–338.
- . C. Danwei, H. Xiuli, R. Xunyi, Access control of cloud service based on UCON, LNCS Cloud Computing 5931 (2009) 559–564.
- . D. Fall, G. Blanc, T. Okuda, Y. Kadobayashi, S. Yamaguchi, Toward quantified risk-adaptive access control for multi-tenant Cloud computing, in: The 6th Joint Workshop on Information Security, 2011, pp. 1–14. URL https://sites.google.com/site/jwis2011/program.
- . K. Sreedhar, M. Faruk, and B. Venkateswarlu, “A genetic tds and bug with pseudo-identifier for privacy preservation over incremental data sets, ”Journal of Intelligent & Fuzzy Systems, vol. 32,no. 4, pp. 2863–2873, 2017.
- . M. N. Faruk, G. L. V. Prasad, and G. Divya, ‘‘A genetic PSO algorithm with QoS-aware cluster cloud service composition,’’ in Advances in Signal Processing and Intelligent Recognition Systems(Advances in Intelligent Systems and Computing), vol. 425. Trivandrum, India: Springer, 2016,pp. 395–405.W.O.W. Group, OWL 2 Web Ontology Language: Document Overview, W3C Recommendation, W3C, 2009.
- . Horrocks, P.F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, SWRL: a semantic web rule language combining OWL and RuleML, Tech. Rep., W3C, 2004. URL http://www.w3.org/Submission/SWRL/.
- . W. Bumpus, J.W. Sweitzer, P. Thompson, A. Westerinen, R.C. Williams, Common Information Model: Implementing the Object Model for Enterprise management, John Wiley & Sons, Inc., 2000.
- . T. Vetterli, A. Vaduva, M. Staudt, Metadata standards for data warehousing: open information model vs. common warehouse metadata, ACM SIGMOD Record 29 (3) (2000) 68–75.
- . M. Debusmann, A. Keller, SLA-driven management of distributed systems using the common information model, in: Proceeding of the 8th IFIP/IEEE International Symposium on Integrated Network Management, 2003, pp. 1–14.
- . H. Mao, L. Huang, M. Li, Web resource monitoring based on common information model, in: IEEE Asia-Pacific Conference on Services Computing, 2006, pp. 520–525.
- . B. Harikrishna, Dr. S. Kiran, K. Mani Deep, Network as a Service Model in Cloud Authentication by HMAC Algorithm, in: International Journal of Advanced Networking and Applications, vol 9,no 6, pp. 3626-3631, 2018.
- . B. Harikrishna, Dr. S. Kiran, K. Mani Deep, M. Asha Aruna Sheela, Fibonacci Technique for Privacy and Security to Sensitive Data on Cloud Environment, in: International Journal of Advanced Networking and Applications, vol 11,no 4, pp. 4374-4377, 2020.
Abstract Views: 218
PDF Views: 0