Content uploaded by Carlos Becker Westphall
Author content
All content in this area was uploaded by Carlos Becker Westphall on Jun 29, 2014
Content may be subject to copyright.
Link%to%download%the%paper%at%IEEE%Explore:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6838319%
%
%
6/29/14, 1:44 PMIEEE Xplore Abstract - A dynamic risk-based access control architecture for cloud computing
Page 1 of 2http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6838319
IEEE.org | IEEE Xplore Digital Library | IEEE Standards | IEEE Spectrum | More Sites
For Institutional Users:
Institutional Sign In
Athens/Shibboleth
Browse Conference Publications > Network Operations and Manage ...
A dynamic risk-based access control
architecture for cloud computing
Full Text
Sign-In or Purchase
3
Author(s)
Tweet
Tweet
0
0
Share
Share
Page(s):
1 - 9
Conference Location :
Krakow, Poland
Digital Object Identifier :
10.1109/NOMS.2014.6838319
Publisher:
IEEE
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to
take advantage of its features and among the research challenges found in the cloud, we can
highlight Identity and Access Management. The main problems of the application of access control in
the cloud are the necessary flexibility and scalability to support a large number of users and
resources in a dynamic and heterogeneous environment, with collaboration and information sharing
needs. This paper proposes the use of risk-based dynamic access control for cloud computing. The
proposal is presented as an access control model based on an extension of the XACML standard
with three new components: the Risk Engine, the Risk Quantification Web Services and the Risk
Policies. The risk policies present a method to describe risk metrics and their quantification, using
local or remote functions. The risk policies allow users and cloud service providers to define how to
handle risk-based access control for their resources, using different quantification and aggregation
methods. The model reaches the access decision based on a combination of XACML decisions and
risk analysis. A prototype of the model is implemented, showing it has enough expressivity to
describe the models of related work. In the experimental results, the prototype takes between 2 and
6 milliseconds to reach access decisions using a risk policy. A discussion on the security aspects of
the model is also presented.
Published in:
Network Operations and Management Symposium (NOMS), 2014 IEEE
Date of Conference:
5-9 May 2014
Cart (0) | Create Account | Sign In
Santos, Daniel Ricardo dos ; Networks and Management Laboratory, Federal University of Santa Catarina, Florianópolis - Brazil ; Westphall, Carla Merkle ;
Westphall, Carlos Becker
Authors References Cited By Keywords Metrics SimilarAbstract
0
Like
Like