[go: up one dir, main page]

Skip to main content

Access Control Approach in Public Software as a Service Cloud

  • Conference paper
Theory and Engineering of Complex Systems and Dependability (DepCoS-RELCOMEX 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 365))

Included in the following conference series:

  • 1589 Accesses

Abstract

Newest technologies like cloud computing are readily explored by both private users and organizations. Cloud brings with it ease of use and convenience for the end user. However often at the cost of convenience we may pay in terms of data security.

The paper presents a new access control security model that can strengthen data protection in public software as a service cloud. The new model gives the new opportunities and possibilities for tighter protection of data. Its constant checking of the permissions, dynamics, manageability and elasticity show that it can be introduced to the cloud environment and ensures tight security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Special Publication 800-145, National Institute of Standards and Technology (2011)

    Google Scholar 

  2. Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing, Inc. (2010)

    Google Scholar 

  3. Hausman, K., Cook, S.L., Sampaio, T.: Cloud Essentials, Sybex by John Wiley & Sons, Inc. (2013)

    Google Scholar 

  4. Winkler, J.R.V.: Securing the Cloud. Cloud computer security techniques and tactics. Syngress (2011)

    Google Scholar 

  5. Ahson, S., Ilyas, M.: Cloud Computing and Software Services. Theory and Techniques. CRC Press (2011)

    Google Scholar 

  6. Gnanasundaram, S., Shrivastava, A.: Information Storage and Management, 2nd edn. EMC Corporation (2012)

    Google Scholar 

  7. Yang, K., Jia, X.: Security for Cloud Storage Systems. Springer (2014)

    Google Scholar 

  8. Poniszewska-Maranda, A.: Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives. Journal of Theoretical and Applied Computer Science 8(1), 35–49 (2014)

    Google Scholar 

  9. Shackleford, D.: Cloud Security and Compliance: A Primer, A SANS Whitepaper (2010)

    Google Scholar 

  10. Poniszewska-Maranda, A.: Modeling and design of role engineering in development of access control for dynamic information systems. Bulletin of the Polish Academy of Sciences, Technical Science 61(3), 569–580 (2013)

    Google Scholar 

  11. Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access control. ACM TISSEC (2001)

    Google Scholar 

  12. Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM TISSEC 8(4), 351–387 (2005)

    Article  Google Scholar 

  13. Gharehchopogh, F.S., Bahari, M.: Evaluation of the data security methods in cloud computing environments. International Journal in Foundations of Computer Science & Technology (IJFCST) 3(2), 41–51 (2013)

    Article  Google Scholar 

  14. Borthakur, D.: The Hadoop Distributed File System: Architecture and Design. The Apache Software Foundation, pp. 3–4

    Google Scholar 

  15. Kaur, S.: Cryptography and Encryption. Cloud Computing. VSRD International Journal of CS & IT 2(3), 242–249 (2012)

    Google Scholar 

  16. Anthony, T., Velte, A.T., Velte, T.J., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw-Hill (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aneta Poniszewska-Maranda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Poniszewska-Maranda, A., Rutkowska, R. (2015). Access Control Approach in Public Software as a Service Cloud. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19216-1_36

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19215-4

  • Online ISBN: 978-3-319-19216-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics