A Distributed Access Control Architecture for Cloud Computing

The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed archi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE software 2012-03, Vol.29 (2), p.36-44
Hauptverfasser: Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., Ghafoor, A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 44
container_issue 2
container_start_page 36
container_title IEEE software
container_volume 29
creator Almutairi, A.
Sarfraz, M.
Basalamah, S.
Aref, W.
Ghafoor, A.
description The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.
doi_str_mv 10.1109/MS.2011.153
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MS_2011_153</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6095492</ieee_id><sourcerecordid>2636231701</sourcerecordid><originalsourceid>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</originalsourceid><addsrcrecordid>eNo90D1PwzAQgGELgUQpTIwskRhRyp0dJ_HAEKV8Sa0YCrOV2BdI1dbFdgb-PamKmG64R3fSy9g1wgwR1P1yNeOAOEMpTtgElSjSDFV2yiZQZJAWmVTn7CKENQBIFDBhD1Uy70P0fTtEskllDIWQ1G4XvdsklTdffSQTB09J53xSb9xgx_V2P8R-93nJzrpmE-jqb07Zx9Pje_2SLt6eX-tqkRpRqpi2quCyBNtYW3KSsiGFEniOkmxpuCw4x44KkrwQbQeGLKc2zwEFtq3MuJiy2-PdvXffA4Wo127wu_GlRgAslUSOo7o7KuNdCJ46vff9tvE_I9KHPnq50oc-euwz6puj7onoX-agZKa4-AWI2F8I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1001895121</pqid></control><display><type>article</type><title>A Distributed Access Control Architecture for Cloud Computing</title><source>IEEE Electronic Library (IEL)</source><creator>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</creator><creatorcontrib>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</creatorcontrib><description>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</description><identifier>ISSN: 0740-7459</identifier><identifier>EISSN: 1937-4194</identifier><identifier>DOI: 10.1109/MS.2011.153</identifier><identifier>CODEN: IESOEG</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Access control ; Analysis ; Authorization ; Cloud computing ; Collaboration ; Computer architecture ; Computer security ; Customer services ; Design ; distributed access control ; multitenancy ; Privacy ; Resource management ; resource virtualization ; Security management ; Semantics ; Software engineering ; Studies</subject><ispartof>IEEE software, 2012-03, Vol.29 (2), p.36-44</ispartof><rights>Copyright IEEE Computer Society Mar/Apr 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</citedby><cites>FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6095492$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6095492$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Almutairi, A.</creatorcontrib><creatorcontrib>Sarfraz, M.</creatorcontrib><creatorcontrib>Basalamah, S.</creatorcontrib><creatorcontrib>Aref, W.</creatorcontrib><creatorcontrib>Ghafoor, A.</creatorcontrib><title>A Distributed Access Control Architecture for Cloud Computing</title><title>IEEE software</title><addtitle>S-M</addtitle><description>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</description><subject>Access control</subject><subject>Analysis</subject><subject>Authorization</subject><subject>Cloud computing</subject><subject>Collaboration</subject><subject>Computer architecture</subject><subject>Computer security</subject><subject>Customer services</subject><subject>Design</subject><subject>distributed access control</subject><subject>multitenancy</subject><subject>Privacy</subject><subject>Resource management</subject><subject>resource virtualization</subject><subject>Security management</subject><subject>Semantics</subject><subject>Software engineering</subject><subject>Studies</subject><issn>0740-7459</issn><issn>1937-4194</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNo90D1PwzAQgGELgUQpTIwskRhRyp0dJ_HAEKV8Sa0YCrOV2BdI1dbFdgb-PamKmG64R3fSy9g1wgwR1P1yNeOAOEMpTtgElSjSDFV2yiZQZJAWmVTn7CKENQBIFDBhD1Uy70P0fTtEskllDIWQ1G4XvdsklTdffSQTB09J53xSb9xgx_V2P8R-93nJzrpmE-jqb07Zx9Pje_2SLt6eX-tqkRpRqpi2quCyBNtYW3KSsiGFEniOkmxpuCw4x44KkrwQbQeGLKc2zwEFtq3MuJiy2-PdvXffA4Wo127wu_GlRgAslUSOo7o7KuNdCJ46vff9tvE_I9KHPnq50oc-euwz6puj7onoX-agZKa4-AWI2F8I</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Almutairi, A.</creator><creator>Sarfraz, M.</creator><creator>Basalamah, S.</creator><creator>Aref, W.</creator><creator>Ghafoor, A.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2O</scope><scope>M2P</scope><scope>M2T</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>201203</creationdate><title>A Distributed Access Control Architecture for Cloud Computing</title><author>Almutairi, A. ; Sarfraz, M. ; Basalamah, S. ; Aref, W. ; Ghafoor, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c389t-b972580dadd82e55ae91502615ed8c257221fe7e5273bf0ced2eb660131bb5423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Access control</topic><topic>Analysis</topic><topic>Authorization</topic><topic>Cloud computing</topic><topic>Collaboration</topic><topic>Computer architecture</topic><topic>Computer security</topic><topic>Customer services</topic><topic>Design</topic><topic>distributed access control</topic><topic>multitenancy</topic><topic>Privacy</topic><topic>Resource management</topic><topic>resource virtualization</topic><topic>Security management</topic><topic>Semantics</topic><topic>Software engineering</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almutairi, A.</creatorcontrib><creatorcontrib>Sarfraz, M.</creatorcontrib><creatorcontrib>Basalamah, S.</creatorcontrib><creatorcontrib>Aref, W.</creatorcontrib><creatorcontrib>Ghafoor, A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>IEEE software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Almutairi, A.</au><au>Sarfraz, M.</au><au>Basalamah, S.</au><au>Aref, W.</au><au>Ghafoor, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Distributed Access Control Architecture for Cloud Computing</atitle><jtitle>IEEE software</jtitle><stitle>S-M</stitle><date>2012-03</date><risdate>2012</risdate><volume>29</volume><issue>2</issue><spage>36</spage><epage>44</epage><pages>36-44</pages><issn>0740-7459</issn><eissn>1937-4194</eissn><coden>IESOEG</coden><abstract>The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud's main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design model for the architecture.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MS.2011.153</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0740-7459
ispartof IEEE software, 2012-03, Vol.29 (2), p.36-44
issn 0740-7459
1937-4194
language eng
recordid cdi_crossref_primary_10_1109_MS_2011_153
source IEEE Electronic Library (IEL)
subjects Access control
Analysis
Authorization
Cloud computing
Collaboration
Computer architecture
Computer security
Customer services
Design
distributed access control
multitenancy
Privacy
Resource management
resource virtualization
Security management
Semantics
Software engineering
Studies
title A Distributed Access Control Architecture for Cloud Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T05%3A22%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Distributed%20Access%20Control%20Architecture%20for%20Cloud%20Computing&rft.jtitle=IEEE%20software&rft.au=Almutairi,%20A.&rft.date=2012-03&rft.volume=29&rft.issue=2&rft.spage=36&rft.epage=44&rft.pages=36-44&rft.issn=0740-7459&rft.eissn=1937-4194&rft.coden=IESOEG&rft_id=info:doi/10.1109/MS.2011.153&rft_dat=%3Cproquest_RIE%3E2636231701%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1001895121&rft_id=info:pmid/&rft_ieee_id=6095492&rfr_iscdi=true