Access control as a service for the Cloud

Nikos Fotiou1, Apostolis Machas1, George C. Polyzos1, George Xylomenos1
1Mobile Multimedia Laboratory, Department of Informatics, School of Information Sciences and Technology, Athens University of Economics and Business, Evelpidon 47A, Athens, 113 62, Greece

Tóm tắt

Từ khóa


Tài liệu tham khảo

PwC: Global State of Information Security Survey (2012). PwC: Global State of Information Security Survey (2012).

Subashini S, Kavitha V: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 2011, 34(1):1–11. 10.1016/j.jnca.2010.07.006

Gorniak S (ed) (2010) Priorities for research on current and emerging network trends. ENISA. . https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/procent

Catteddu D, Hogben G (eds) (2009) Cloud Computing Benefits, risks and recommendations for information security. ENISA. . https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf

Cloud Security Alliance (2013) The Notorious Nine Cloud Computing Top Threats in 2013. . https://cloudsecurityalliance.org/

Armando A, Carbone R, Compagna L, Cuellar J, Tobarra L: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. In Proc. of the 6th ACM Workshop on Formal Methods in Security Engineering. ACM, New York, NY; 2008:1–10. 10.1145/1456396.1456397

Somorovsky J, Mayer A, Schwenk J, Kampmann M, Jensen M: On breaking SAML: Be whoever you want to be. In Proc. of the 21st USENIX Security Symposium. USENIX Association, Berkeley, CA; 2012:21–21.

Fotiou N, Machas A, Polyzos GC, Xylomenos G: Access control delegation for the cloud. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference On. IEEE, Canada; 2014:13–18. 10.1109/INFCOMW.2014.6849161

Wang G, Liu Q, Wu J: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security. CCS ’10. ACM, New York, NY, USA; 2010:735–737. 10.1145/1866307.1866414

Zhou L, Varadharajan V, Hitchens M (2011) Enforcing role-based access control for secure data storage in the cloud. Comput J.doi:10.1093/comjnl/bxr080, . http://comjnl.oxfordjournals.org/content/early/2011/09/02/comjnl.bxr080.abstract

Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y: Fine-grained data access control systems with user accountability in cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference On. IEEE Computer Society, Washington, DC; 2010:89–96. 10.1109/CloudCom.2010.44

Yu S, Wang C, Ren K, Lou W: Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE. IEEE Press, Piscataway, NJ; 2010:1–9.

OASIS (2013) eXtensible Access Control Markup Language (XACML) Version 3.0.22. . http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-en.html

Goyal V, Pandey O, Sahai A, Waters B: Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS ’06. ACM, New York, NY, USA; 2006:89–98.

Recordon D, Reed D: OpenID 2.0: a platform for user-centric identity management. In Proc. of the 2nd ACM Workshop on Digital Identity Management. ACM, New York, NY; 2006:11–16. 10.1145/1179529.1179532

Hardt D (ed) (2012) The OAuth 2.0 authorization framework. RFC 6749. . https://tools.ietf.org/html/rfc6749

Nunez D, Agudo I, Lopez J: Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services. In Proc of the IEEE 4th International Conference on Cloud Computing Technology and Science. IEEE Computer Society, Washington, DC, USA; 2012.

Khan RH, Ylitalo J, Ahmed AS (2011) OpenID authentication as a service in OpenStack In: Proc. of the 7th International Conference on Information Assurance and Security, 372–377.. IEEE. (doi://10.1109/ISIAS.2011. 6122782).

Yavatkar R, Pendarakis D, Guerin R (2000) A framework for policy-based admission control. RFC 2753. . https://tools.ietf.org/html/rfc2753

Durham D (ed) (2000) The COPS (Common Open Policy Service) Protocol. RFC 2748. . https://tools.ietf.org/html/rfc2748

Cantor S, Kemp J, Philpott R, Maler E (eds) (2005) Assertions and protocols for the OASIS Security Assertion Markup Language (SAML) v2.0. OASIS. . https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf

Openstack homepage. . last accessed 27 Apr. 2015. http://www.openstack.org/

Google Drive homepage. , last accessed 27 Apr. 2015. https://drive.google.com

Google Keyczar homepage. , last accessed 27 Apr. 2015. https://github.com/google/keyczar

Google App Engine homepage. , last accessed 27 Apr. 2015. https://developers.google.com/appengine/

Wang R, Chen S, Wang X: Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In Proc. of the IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA; 2012:365–379.