Exploring Predicate Based Access Control for Cloud Workflow Systems

α
B. Srinivasa Rao
B. Srinivasa Rao
σ
G. Appa Rao
G. Appa Rao
α GITAM University GITAM University

Send Message

To: Author

Exploring Predicate Based Access Control for Cloud Workflow Systems

Article Fingerprint

ReserarchID

CSTB39U3K

Exploring Predicate Based Access Control for Cloud Workflow Systems Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Authentication and authorization are the two crucial functions of any modern security and access control mechanisms. Authorization for controlling access to resources is a dynamic characteristic of a workflow system which is based on true business dynamics and access policies. Allowing or denying a user to gain access to a resource is the cornerstone for successful implementation of security and controlling paradigms. Role based and attribute based access control are the existing mechanisms widely used. As per these schemes, any user with given role or attribute respectively is granted applicable privileges to access a resource. There is third approach known as predicate based access control which is less explored. We intend to throw light on this as it provides more fine-grained control over resources besides being able to complement with existing approaches. In this paper we proposed a predicate-based access control mechanism that caters to the needs of cloud-based workflow systems.

References

42 Cites in Article
  1. Marcos Leandro,J Tiago,Nascimento,R Daniel,Carla Santos,Carlos Westphall,Westphall (2012). Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth.
  2. Jorge Bernal Bernabe A,Juan Marin Perez B,Jose Alcaraz Calero B,Felix Garcia Clementec,Gregorio Martinez Perez A,Antonio Skarmetaa (2012). Semantic-aware multitenancy authorization system for cloud architectures.
  3. S Reeja (2012). Role Based Access Control Mechanism In Cloud Computing Using Co -Operative Secondary Authorization Recycling Method.
  4. Umer Khalida,Abdul Ghafoor,Misbah Irum,Muhammad Shibli (2013). Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol.
  5. Arnar Birgisson,Joe Gibbs Politz,U Lfar Erlingsson,Ankur Taly (2014). Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.
  6. Nelson Mimura Gonzalez,*,Marco Antônio Torrez,Marcos Rojas,Fernando Vinícius Maciel Da Silva,Redígolo,Cristina Tereza,* Melo De Brito Carvalho,Charles Miers,†,Mats Näslund,‡,Abu Sho (2013). A framework for authentication and authorization credentials in cloud computing.
  7. Arlindo Luis,Marcon,Altair Olivo Santin,Maicon Stihler,Juliana Bachtold (2014). A UCONABC Resilient Authorization Evaluation for Cloud Computing.
  8. Ulrich Lang (2010). OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications.
  9. Jiann-Liang Chen,Szu-Lin Wuy,Yanuarius Larosa,Pei-Jia Yang,Yang-Fang Li (2011). IMS cloud computing architecture for high-quality multimedia applications.
  10. Masoumeh Zareapoor,Pourya Shamsolmoali,M Alam (2014). Establishing Safe Cloud: Ensuring Data Security and Performance Exploring Predicate based Access Control for Cloud Workflow Systems Global Journal of Computer Science and Technology Volume XVI Issue I Version I 10 Year 2016.
  11. Naresh Kumar,Shalini Sharma (2013). Study of intrusion detection system for DDoS attacks in cloud computing.
  12. Jungwoo Ryoo,Syed Rizvi,William Aiken,John Kissell (2013). Cloud Security Auditing: Challenges and Emerging Approaches.
  13. Masood Rahat,Muhammad Awais,Shibli Yumna,Ghazi Ayesha,Kanwal Arshad,Ali (2014). Cloud authorization: exploring techniques and approach towards effective access control framewo rk.
  14. Zhaohai Zhang,Qiaoyan Wen (2012). An authorization model for multi-tenancy services in cloud.
  15. Shasha Zhu,Guang Gong (2013). Fuzzy Authorization for Cloud Storage.
  16. Primož Cigoj,& Borka,Jerman Blaži Č (2015). An Authentication and Authorization Solution for a Multiplatform Cloud Environment.
  17. Manohar Vasantrao Rathod,Prof Vaidya (2015). Two-step authentication with data deduplication in Cloud.
  18. Jannu,Macha Prasanna Krishna,Kumar (2015). An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space.
  19. Alexander Stanik,Patrick Bittner,Marvin Byfield,Fridtjof Sander,Daniel Schoder (2013). Local authentication and authorization system for immediate setup of cloud environments.
  20. Xuan Hung,Le,Terry Doll,Monica Barbosu,Amneris Luque,Dongwen Wang (2013). Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program.
  21. Lucian Popa,Minlan Yu,Steven Ko,Sylvia Ratnasamy,Ion Stoica (2010). CloudPolice.
  22. Sushmita Ruj,Milos Stojmenovic,Amiya Nayak (2012). Privacy Preserving Access Control with Authentication for Securing Data in Clouds.
  23. Wei She,I-Ling Yen,Bhavani Thuraisingham,San-Yih Huang (2011). Rule-Based Run-Time Information Flow Control in Service Cloud.
  24. Yan Zhu,Di Ma,Chang-Jun Hu,Dijiang Huang (2013). How to use attribute-based encryption to implement role-based access control in the cloud.
  25. Sushmita Ruj,Milos Stojmenovic,Amiya Nayak (2014). Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
  26. Wenhai Sun,Bing Wang,Ning Cao,Ming Li,Wenjing Lou,Y Hou,Hui Li (2013). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
  27. Lili Sun,Hua Wang (2011). A purpose‐based access control in native XML databases.
  28. Lujo Bauer,Limin Jia,Divya Sharma (2010). Constraining Credential Usage in Logic-Based Access Control.
  29. Shan-Shan Tu,Shao-Zhang Niu,Hui Li (2012). A fine-grained access control and revocation scheme on clouds.
  30. Mohammad Ababneh,Duminda Wijesekera (2012). Dynamically Generating Policy Compliant Dialogues for Physical Access Control.
  31. Rafael Teigao,Carlos Maziero,Altair Santin (2011). Applying a usage control model in an operating system kernel.
  32. Lujo Bauer,Limin Jia,Divya Sharma (2010). Constraining Credential Usage in Logic-Based Access Control.
  33. Md,Fakhrul Alam,Syed Onik,Salman-Al-Musawi Sabir,Khairul Anam,Nafiul Rashid (2012). A Secured Cloud based Health Care Data Management System.
  34. Youna Jung,B James,Joshi (2014). CPBAC: Property-based access control model for secure cooperation in online social networks.
  35. L Matthew,Rose Hale,Gamble (2012). Sec Agreement: Advancing Security Risk Calculations in Cloud Services.
  36. Dara Sashank (2013). Cryptography Challenges for Computational Privacy in Public Clouds.
  37. Debasish Jana,Debasis Bandyopadhyay (2015). Controlled privacy in mobile cloud.
  38. Nageshwar Dev Yadav,Prof Wanjari (2014). Research on Virtualization Security Technology in Cloud Computing Environment.
  39. A Akinbi,E Pereira,C Beaumont (2013). Identifying Security Methods and Controls for Secure PaaS Cloud Environments.
  40. Mohammad Ababneh,Duminda Wijesekera,Bret James,Michael (2012). A Policy-Based Dialogue System for Physical Access Control.
  41. Zhenghao Xin,Liang Liu,Gerhard Hancke (2014). AACS: Attribute-Based Access Control Mechanism for Smart Locks.
  42. Alan Karp,Harry Haury,Michael Davis (2009). From ABAC to ZBAC: The Evolution of Access Control Models.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

B. Srinivasa Rao. 2016. \u201cExploring Predicate Based Access Control for Cloud Workflow Systems\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 16 (GJCST Volume 16 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
D.4.6 H.4.1
Version of record

v1.2

Issue date

February 29, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7575
Total Downloads: 2000
2026 Trends
Related Research

Published Article

Authentication and authorization are the two crucial functions of any modern security and access control mechanisms. Authorization for controlling access to resources is a dynamic characteristic of a workflow system which is based on true business dynamics and access policies. Allowing or denying a user to gain access to a resource is the cornerstone for successful implementation of security and controlling paradigms. Role based and attribute based access control are the existing mechanisms widely used. As per these schemes, any user with given role or attribute respectively is granted applicable privileges to access a resource. There is third approach known as predicate based access control which is less explored. We intend to throw light on this as it provides more fine-grained control over resources besides being able to complement with existing approaches. In this paper we proposed a predicate-based access control mechanism that caters to the needs of cloud-based workflow systems.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Exploring Predicate Based Access Control for Cloud Workflow Systems

B. Srinivasa Rao
B. Srinivasa Rao
G. Appa Rao
G. Appa Rao

Research Journals