Security Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model

1
Levina T
Levina T
2
Dr. S C Lingareddy
Dr. S C Lingareddy
1 Alpha College of Engg

Send Message

To: Author

GJCST Volume 13 Issue E16

Article Fingerprint

ReserarchID

CSTNWS84LLH

Security Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

In cloud environment the role based access control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users might be prohibited to consider respective roles only at certain defined time periods. Additionally, these roles can be invoked only on after pre-defined time intervals which depend on the permission of certain action or event. In order to incarcerate this kind of dynamic aspects of a role, numerous models like temporal RBAC (TRBAC) was proposed, then while this approach could not deliver anything else except the constraints of role enabling. Here in this paper, we have proposed robust and an optimum scheme called Dynamic expiration enabled role based access control (DEERBAC) model which is efficient for expressing a broad range of temporal constraints.

19 Cites in Articles

References

  1. Zhu Tianyi,; Liu Weidong,; Song,Jiaxing (2011). An efficient Role Based Access Control System for Cloud Computing.
  2. Wei Li,; Haishan,Wan Xunyiren,; Sheng,Li (2012). A Refined RBAC Model for Cloud Computing.
  3. Canh Ngo,Peter Membrey,Yuri Demchenko,Cees De Laat (2012). Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures.
  4. ; Jiehuang,Chin-Tser Mohamedsharaf,Huang (2012). A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-Cloud.
  5. L Anil,Pereira,; Vineelamuppavarapu,M Soon,Chung (2006). Role-Based Access Control for Grid Database Services Using the Community Authorization Service.
  6. Ammar Masood,Arif Ghafoor,Aditya Mathur (2010). Conformance Testing of Temporal Role-Based Access Control Systems.
  7. Milos Sushmitaruj,Amiya Stojmenovic,Nayak (2013). Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
  8. Hua Wang,; Jinli Cao,Yanchun Zhang (2005). A Flexible Payment Scheme and Its Role-Based Access Control.
  9. Michael Karstensohr,; Drouineaud,Martin Gail-Joonahn,Gogolla (2008). Analyzing and Managing Role-Based Access Control Policies.
  10. Ninghui Someshjha,; Qihua Li,; Wang,H William,Mahesh Winsborough,Tripunitara (2008). Toward Formal Verification of Role-Based Access Control Policies.
  11. Ammar Masood,R Bhatti,A Ghafoor,Aditya Mathur (2009). Scalable and Effective Test Generation for Role-Based Access Control Systems.
  12. Yingying Yu,; Yan Chen; Yuqin,Wen (2013). Task-role based access control model in logistics management system.
  13. Lan Zhou,Vijay Varadharajan,Michael Hitchens (2013). Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage.
  14. Daniela Rosic,Ugljesa Novak,Srdjan Vukmirovic (2013). Role-Based Access Control Model Supporting Regional Division in Smart Grid System.
  15. Anna Ferrara,Georg Fuchsbauer,Bogdan Warinschi (2013). Cryptographically Enforced RBAC.
  16. E Bertino,C Bettini,E Ferrari,P Samarati (1998). An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
  17. V Atluri,A Gal (2002). An Authorization Model for Temporal and Derived Data: Securing Information Portals.
  18. Gail-Joon Ahn,Ravi Sandhu (2000). Role-based authorization constraints specification.
  19. David Ferraiolo,Ravi Sandhu,Serban Gavrila,D Kuhn,Ramaswamy Chandramouli (2001). Proposed NIST standard for role-based access control.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Levina T. 2014. \u201cSecurity Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E16): .

Download Citation

Issue Cover
GJCST Volume 13 Issue E16
Pg. 5- 19
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

February 3, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9010
Total Downloads: 2438
2026 Trends
Research Identity (RIN)
Related Research

Published Article

In cloud environment the role based access control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users might be prohibited to consider respective roles only at certain defined time periods. Additionally, these roles can be invoked only on after pre-defined time intervals which depend on the permission of certain action or event. In order to incarcerate this kind of dynamic aspects of a role, numerous models like temporal RBAC (TRBAC) was proposed, then while this approach could not deliver anything else except the constraints of role enabling. Here in this paper, we have proposed robust and an optimum scheme called Dynamic expiration enabled role based access control (DEERBAC) model which is efficient for expressing a broad range of temporal constraints.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model

Levina T
Levina T Alpha College of Engg
Dr. S C Lingareddy
Dr. S C Lingareddy

Research Journals