TC-enabled and distributed cloud computing access control model

Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided ser...

Full description

Saved in:
Bibliographic Details
Main Authors: Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali
Format: Article
Published: Asian Network for Scientific Information 2014
Online Access:http://psasir.upm.edu.my/id/eprint/35600/
http://scialert.net/abstract/?doi=jas.2014.620.630
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.35600
record_format eprints
spelling my.upm.eprints.356002016-01-18T02:06:01Z http://psasir.upm.edu.my/id/eprint/35600/ TC-enabled and distributed cloud computing access control model Halboob, Waleed Mahmod, Ramlan Alghathbar, Khaled S. Mamat, Ali Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. Moreover, several access control issues have not been considered in cloud computing such as providing users with a temporal and delegable access. This paper proposed the design of a trusted and decentralized cloud computing access control model for better security and scalability. To address the scalability issue, the components of the proposed model are separated in such a way that they can be decentralized and executed in different extensible machines. The proposed model includes a Trusted XML-based Cloud Computing Policy Language (TXCCPL) that specifies access control policies for authenticating and authorizing both the user and his platform based on the Decentralized Trust Management (DTM) and Trusted Computing (TC) concepts. An Identity Based Encryption (IBE) is used for providing users with temporal and delegable access. Our analysis shows that the proposed model is cost-effectively distributed while avoiding the possible bottlenecks and, as a result, effectively scales with increased workloads. Also, using the DTM and TC concepts help on addressing several security challenges found in cloud computing. Asian Network for Scientific Information 2014 Article PeerReviewed Halboob, Waleed and Mahmod, Ramlan and Alghathbar, Khaled S. and Mamat, Ali (2014) TC-enabled and distributed cloud computing access control model. Journal of Applied Sciences, 14 (7). pp. 620-630. ISSN 1812-5654; ESSN: 1812-5662 http://scialert.net/abstract/?doi=jas.2014.620.630 10.3923/jas.2014.620.630
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
description Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. Moreover, several access control issues have not been considered in cloud computing such as providing users with a temporal and delegable access. This paper proposed the design of a trusted and decentralized cloud computing access control model for better security and scalability. To address the scalability issue, the components of the proposed model are separated in such a way that they can be decentralized and executed in different extensible machines. The proposed model includes a Trusted XML-based Cloud Computing Policy Language (TXCCPL) that specifies access control policies for authenticating and authorizing both the user and his platform based on the Decentralized Trust Management (DTM) and Trusted Computing (TC) concepts. An Identity Based Encryption (IBE) is used for providing users with temporal and delegable access. Our analysis shows that the proposed model is cost-effectively distributed while avoiding the possible bottlenecks and, as a result, effectively scales with increased workloads. Also, using the DTM and TC concepts help on addressing several security challenges found in cloud computing.
format Article
author Halboob, Waleed
Mahmod, Ramlan
Alghathbar, Khaled S.
Mamat, Ali
spellingShingle Halboob, Waleed
Mahmod, Ramlan
Alghathbar, Khaled S.
Mamat, Ali
TC-enabled and distributed cloud computing access control model
author_facet Halboob, Waleed
Mahmod, Ramlan
Alghathbar, Khaled S.
Mamat, Ali
author_sort Halboob, Waleed
title TC-enabled and distributed cloud computing access control model
title_short TC-enabled and distributed cloud computing access control model
title_full TC-enabled and distributed cloud computing access control model
title_fullStr TC-enabled and distributed cloud computing access control model
title_full_unstemmed TC-enabled and distributed cloud computing access control model
title_sort tc-enabled and distributed cloud computing access control model
publisher Asian Network for Scientific Information
publishDate 2014
url http://psasir.upm.edu.my/id/eprint/35600/
http://scialert.net/abstract/?doi=jas.2014.620.630
_version_ 1643831501882654720
score 13.160551