Electronic Credential based Security Management in Decentralized Computing Environment
نویسندگان
چکیده
Role Based Access Control (RBAC) and Access Control List (ACL) are the most commonly adopted access control mechanisms in traditional centralized computing environment. Nowadays people frequently work in a highly dynamic and distributed computing environment, in which two or more heterogeneous systems do not share the same security domain. Traditional access control mechanisms that require pre-registration become obsolete. Electronic credential based distributed access control turns out to be the best solution to the current situation. We adopt three kinds of certificates in the solution: attribute certificate, capability certificate and delegation certificate. A language is required to delineate a unified certificate format and to enable administrators to define the trust relationships between e-strangers. We present a policy language, Z-Trust Language, to meet this end. Administrators can finely manage privileges assigned to individual users with the Language. A java program has also been developed as the compliance checker.
منابع مشابه
Data Storage Using Decentralized Access Control With Multiple Authentication in Clouds
Cloud computing reaches enormous growth in an Internet-Based development and so privacy and security are the most important issues. In this paper, we propose a new decentralized access control scheme with multiple KDC’s for securing data stored in cloud. In proposed scheme, the cloud provides the anonymous authenticity of the user through Third party auditor. Moreover, we implemented safe stora...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کامل