Abstract
With the rise of the era of “cloud computing”, concerns about “Security” continue to increase. Cloud computing environments impose new challenges on access control techniques due to the growing scale and dynamicity of hosts within the cloud infrastructure; we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). A prototype of our proposed FCDAC will be designed using Prometheus Methodology and implemented using the Java Agent Development Framework Security (JADE-S).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on Cloud Storage Architecture and Key Technologies, pp. 1044–1048. ACM, New York (2009)
Blaze, M., Feigenbaum, J.: The Role of Trust Management in Distributed Systems Security. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. In: Cryptology ePrint Archive, pp. 1–8 (2008), http://eprint.iacr.org/
Kormann, D., Rubin, A.: Risks of the Passport Single Sign on Protocol. Computer Networks 33(1-6), 51–58 (2000)
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage, pp. 29–42. USENIX Association (2003)
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage, pp. 131–145. Citeseer (2003)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes With Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC) 9(1), 1–30 (2006)
Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of Access Control Evolution on Outsourced Data. In: VLDB Endowment, pp. 123–134 (2007)
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and Efficient Key Management for Access Hierarchies. ACM Transactions on Information and System Security (TISSEC) 12(3), 1–43 (2009)
Johnson, M., Chang, P., Jeffers, R., Bradshaw, J.M., Soo, V.W., Breedy, M.R., Bunch, L., Kulkarni, S., Lott, J., Suri, N.: KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-Based Grid Architectures, pp. 32–41. Citeseer (2003)
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, rei, and ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)
Kagal, L.: Rei: A Policy Language for the Me-centric Project. HP Labs, accessible online, pp. 1-23 (2002), http://www.hpl.hp.com/techreports.html
Samarati, P., de Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Foundations of Security Analysis and Design, pp. 137–196 (2001)
Lampson, B.W.: Protection. ACM SIGOPS Operating Systems Review 8(1), 18–24 (1974)
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM 19, 461–471 (1976)
Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236–243 (1976)
Bell, D.E., Lapadula, L.J., Mitre, M.A.: orp Bedford. Secure Computer Systems: Mathematical Foundations 1(M74-244), 1–42 (1973)
Whitman, M.E., Mattord, H.J.: Management of Information Security, pp. 1–18. Course Technology Press, Boston (2004)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing, pp. 1–9. IEEE, Los Alamitos (2009)
Padgham, L., Winikoff, M.: Developing Intelligent Agent Systems: A Practical Guide, pp. 1–240. Wiley, Chichester (2004); ISBN: 978-0-470-86120-2
Fabio, B., Agostino, P., Giovanni, R.: JADE—A FIPA-Compliant Agent Framework CSELT Internal Technical Report. Part of this report has been also published in Proceedings of PAAM 1999, pp. 97–108 (1999)
Bellifemine, F.L., Poggi, A., Rimassa, G.: Developing multi-agent systems with JADE. In: Castelfranchi, C., Lespérance, Y. (eds.) ATAL 2000. LNCS (LNAI), vol. 1986, p. 89. Springer, Heidelberg (2001)
Agostino, P., Rimassa, G., Tomaiuolo, M.: Multi-User and Security Support for Multi-Agent Systems. In: Proceedings of WOA Workshop, Modena, Italy, pp. 1–7 (2001)
Bellifemine, F., Poggi, A., Rimassa, G.: Developing Multi-Agent Systems with a FIPA-Compliant Agent Framework. Software—Practice and Experience (31), 103–128 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Talib, A.M., Atan, R., Abdullah, R., Azmi Murad, M.A. (2011). Towards New Data Access Control Technique Based on Multi Agent System Architecture for Cloud Computing. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22410-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-22410-2_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22409-6
Online ISBN: 978-3-642-22410-2
eBook Packages: Computer ScienceComputer Science (R0)