scholarly journals Enforcing Role-Based Access Control for Secure Data Storage in the Cloud

2011 ◽  
Vol 54 (10) ◽  
pp. 1675-1687 ◽  
Author(s):  
L. Zhou ◽  
V. Varadharajan ◽  
M. Hitchens
2013 ◽  
Vol 3 (4) ◽  
pp. 28-37 ◽  
Author(s):  
Mamoon Rashid ◽  
Er. Rishma Chawla

Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.


Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 492
Author(s):  
Salah T. Alshammari ◽  
Aiiad Albeshri ◽  
Khalid Alsubhi

Cloud data storage is revolutionary because it eliminates the need for additional hardware, which is often costly, inconvenient, and requires additional space. Cloud data storage allows data owners to store large amounts of data in a flexible way and at low cost. The number of online cloud storage services and their consumers has therefore increased dramatically. However, ensuring the privacy and security of data on a digital platform is often a challenge. A cryptographic task-role-based access control (T-RBAC) approach can be used to protect data privacy. This approach ensures the accessibility of data for authorized consumers and keeps it safe from unauthorized consumers. However, this type of cryptographic approach does not address the issue of trust. In this paper, we propose a comprehensive trust model integrated with a cryptographic T-RBAC to enhance the privacy and security of data stored in cloud storage systems, and suggests that trust models involve inheritance and hierarchy in the roles and tasks of trustworthiness evaluation, where this study aims to identify the most feasible solution for the trust issue in T-RBAC approaches. Risk evaluations regarding other possible flaws of the design are also performed. The proposed design can decrease risk by providing high security for cloud storage systems and improve the quality of decisions of cloud operators and data owners.


Sign in / Sign up

Export Citation Format

Share Document