Abstract
Newest technologies like cloud computing are readily explored by both private users and organizations. Cloud brings with it ease of use and convenience for the end user. However often at the cost of convenience we may pay in terms of data security.
The paper presents a new access control security model that can strengthen data protection in public software as a service cloud. The new model gives the new opportunities and possibilities for tighter protection of data. Its constant checking of the permissions, dynamics, manageability and elasticity show that it can be introduced to the cloud environment and ensures tight security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mell, P., Grance, T.: The NIST definition of cloud computing. Special Publication 800-145, National Institute of Standards and Technology (2011)
Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing, Inc. (2010)
Hausman, K., Cook, S.L., Sampaio, T.: Cloud Essentials, Sybex by John Wiley & Sons, Inc. (2013)
Winkler, J.R.V.: Securing the Cloud. Cloud computer security techniques and tactics. Syngress (2011)
Ahson, S., Ilyas, M.: Cloud Computing and Software Services. Theory and Techniques. CRC Press (2011)
Gnanasundaram, S., Shrivastava, A.: Information Storage and Management, 2nd edn. EMC Corporation (2012)
Yang, K., Jia, X.: Security for Cloud Storage Systems. Springer (2014)
Poniszewska-Maranda, A.: Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives. Journal of Theoretical and Applied Computer Science 8(1), 35–49 (2014)
Shackleford, D.: Cloud Security and Compliance: A Primer, A SANS Whitepaper (2010)
Poniszewska-Maranda, A.: Modeling and design of role engineering in development of access control for dynamic information systems. Bulletin of the Polish Academy of Sciences, Technical Science 61(3), 569–580 (2013)
Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access control. ACM TISSEC (2001)
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM TISSEC 8(4), 351–387 (2005)
Gharehchopogh, F.S., Bahari, M.: Evaluation of the data security methods in cloud computing environments. International Journal in Foundations of Computer Science & Technology (IJFCST) 3(2), 41–51 (2013)
Borthakur, D.: The Hadoop Distributed File System: Architecture and Design. The Apache Software Foundation, pp. 3–4
Kaur, S.: Cryptography and Encryption. Cloud Computing. VSRD International Journal of CS & IT 2(3), 242–249 (2012)
Anthony, T., Velte, A.T., Velte, T.J., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw-Hill (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Poniszewska-Maranda, A., Rutkowska, R. (2015). Access Control Approach in Public Software as a Service Cloud. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-19216-1_36
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19215-4
Online ISBN: 978-3-319-19216-1
eBook Packages: EngineeringEngineering (R0)