Fine-grain access control for securing shared resources in computational grids

Author(s):  
A.R. Butt ◽  
S. Adabala ◽  
N.H. Kapadia ◽  
R. Figueiredo ◽  
J.A.B. Fortes
2012 ◽  
Vol 263-266 ◽  
pp. 1461-1466
Author(s):  
Xiao Ming Meng ◽  
Jian Hua Zhang

Focus on the problem of dynamic authorization access control of Distributed Multi-Organization Management Information System (DMOMIS), the system resources are divided into two kinds: relatively independent resources and shared resources. These two kinds of resources were used different authorization system to authorize. The relatively independent resources were authorized by using distributed authorization system (DA), and the similar and shared resources were authorized by using authorized system (A). According to the key terms definition, the system hypothesis and the idea of dynamic programming, then the dynamic authorization access control process of DMOMIS was abstracted as a multi stage users authorization process based on resources, and put out the dynamic authorization access control strategy model of DMOMIS, at last, depicted its execution process.


Author(s):  
Hao Jiang ◽  
Ahmed Bouabdallah

Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT, and 5G have emerged and brought out the need for protecting shared resources and services under time-critical and energy-constrained scenarios with real-time policy-based access control. To achieve this, the policy language needs to be very expressive but lightweight and efficient. These challenges are investigated and a set of key requirements for such a policy language is identified. JACPoL is accordingly introduced as a descriptive, scalable, and expressive policy language in JSON. JACPoL by design provides a flexible and fine-grained ABAC style (attribute-based access control) while it can be easily tailored to express other access control models. The design and implementation of JACPoL are illustrated together with its evaluation in comparison with other existing policy languages. The result shows that JACPoL can be as expressive as existing ones but more simple, scalable, and efficient. The performance evaluation shows that JACPoL requires much less processing time and memory space than XACML.


2012 ◽  
Vol 21 (4) ◽  
pp. 692-701 ◽  
Author(s):  
F. Amato ◽  
V. Casola ◽  
N. Mazzocca ◽  
S. Romano

Author(s):  
Ayman Haggag ◽  
◽  
Mohamed Ghoneim ◽  
Jianming Lu ◽  
Takashi Yahagi ◽  
...  

The access control and scalable encryption scheme we propose for JPEG 2000 encoded images encrypts JEPG 2000 codestreams using the SNOW 2 progressive encryption algorithm to encrypt resolutions, quality layers, or packets independently to provide resolution, quality or fine-grain scalability. Access is controlled to different image resolutions or quality levels granted to different users receiving the same encrypted JPEG 2000 codestream but having different decryption keys. Keys used with successive resolutions or quality layers are mutually dependent based on the SHA-256 one-way hashing function. Encrypted JPEG 2000 codestreams are transcoded by an intermediate untrusted network transcoder, without decryption and without access to decryption keys. Our encryption scheme preserves most of the inherent flexibility of JPEG 2000 encoded images and is carefully designed to produce encrypted codestreams backward-compatible with JPEG 2000 compliant decoders.


Author(s):  
Pramod P Pillai ◽  
Venkataratnam P. ◽  
Siva Yellampalli

Cloud computing is becoming a de facto standard for most of the emerging technology solutions. In a typical cloud environment, various tenants purchase the compute, storage resource, and would be sharing the resource with other tenants. Sharing of the resources among various tenants is not popular due to the security concerns. There are few solutions that try to solve the security problem of resource sharing among tenants. Having a trusted mediator between multiple tenants is one of the methods. Few research papers have been written, and this chapter attempts to enhance one of the published solutions: Cross-tenant access control model for cloud computing. Most of the existing research papers explore the theoretical way to solve the problem. This project develops a working prototype and proves how resource sharing can be achieved. This research develops the concept of resource sharing activation, where the resource can be shared with multiple cloud tenant and the deactivation where the shared resources can be removed from the shared resource pool.


Sign in / Sign up

Export Citation Format

Share Document