Hierarchical attribute-role based access control for cloud computing

12Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid and wide adoption of cloud computing, data outsourcing in cloud storage is gaining attention due to its cost effectiveness, reliability and availability. However, data outsourcing introduces new data security and privacy issues, therefore access control and cryptography are essential ingredients in a cloud computing environment to assure the confidentiality of the outsourced data. Existing access control systems suffer from manual user role and role permission assignments that impose online and computational burdens on the data owner in large scale cloud systems. In this paper, a hierarchical attribute driven role based access control system is proposed, such that the user role assignments can be automatically constructed using policies applied on the attributes of users and roles. The proposed access control system consequently solves the scalability and key management problems in cloud storage systems.

Cite

CITATION STYLE

APA

Abo-Alian, A., Badr, N. L., & Tolba, M. F. (2016). Hierarchical attribute-role based access control for cloud computing. In Advances in Intelligent Systems and Computing (Vol. 407, pp. 381–389). Springer Verlag. https://doi.org/10.1007/978-3-319-26690-9_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free