Constraints for Attribute Based Access Control with Application in Cloud Iaas Approved by Supervising Committee:

نویسندگان

  • Ravi Sandhu
  • Ram Krishnan
  • Weining Zhang
  • Gregory White
  • Shouhuai Xu
  • Nilufar Ferdous
  • KHALID ZAMAN BIJON
  • Farhan Patwa
  • Rajendra Boppana
  • Greg White
چکیده

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.1 Attribute Based Access Control . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Cloud Infrastructure-as-a-Service . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Organization of the Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Chapter 2: Background and Literature Review . . . . . . . . . . . . . . . . . . . . . . . 10 2.1 Overview of Traditional and Existing Access Control Models . . . . . . . . . . . . 10 2.2 Attribute Based Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.1 Attribute Based Access Control . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.2 Attribute Based Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.3 Constraints Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.4 Policy Specification in cloud Infrastructure-as-a-Service . . . . . . . . . . . . . . 13 2.4.1 Related to Virtual Resources Mapping Configuration Management . . . . . 13 2.4.2 Related to Virtual Resource Scheduling . . . . . . . . . . . . . . . . . . . 14 2.5 Overview of OpenStack Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 16

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authorization Federation in Multi-tenant Multi-cloud Iaas Approved by Supervising Committee:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust

A major barrier to the adoption of cloud Infrastructure-as-aService (IaaS) is collaboration, where multiple tenants engage in collaborative tasks requiring resources to be shared across tenant boundaries. Currently, cloud IaaS providers focus on multi-tenant isolation, and offer limited or no cross-tenant access capabilities in their IaaS APIs. In this paper, we present a novel attribute-based ...

متن کامل

A Method for Measuring Energy Consumption in IaaS Cloud

The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014