[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Towards New Data Access Control Technique Based on Multi Agent System Architecture for Cloud Computing

  • Conference paper
Digital Information Processing and Communications (ICDIPC 2011)

Abstract

With the rise of the era of “cloud computing”, concerns about “Security” continue to increase. Cloud computing environments impose new challenges on access control techniques due to the growing scale and dynamicity of hosts within the cloud infrastructure; we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). A prototype of our proposed FCDAC will be designed using Prometheus Methodology and implemented using the Java Agent Development Framework Security (JADE-S).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on Cloud Storage Architecture and Key Technologies, pp. 1044–1048. ACM, New York (2009)

    Google Scholar 

  2. Blaze, M., Feigenbaum, J.: The Role of Trust Management in Distributed Systems Security. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  3. Bowers, K.D., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. In: Cryptology ePrint Archive, pp. 1–8 (2008), http://eprint.iacr.org/

  4. Kormann, D., Rubin, A.: Risks of the Passport Single Sign on Protocol. Computer Networks 33(1-6), 51–58 (2000)

    Article  Google Scholar 

  5. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage, pp. 29–42. USENIX Association (2003)

    Google Scholar 

  6. Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage, pp. 131–145. Citeseer (2003)

    Google Scholar 

  7. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes With Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC) 9(1), 1–30 (2006)

    Article  MATH  Google Scholar 

  8. Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of Access Control Evolution on Outsourced Data. In: VLDB Endowment, pp. 123–134 (2007)

    Google Scholar 

  9. Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and Efficient Key Management for Access Hierarchies. ACM Transactions on Information and System Security (TISSEC) 12(3), 1–43 (2009)

    Article  Google Scholar 

  10. Johnson, M., Chang, P., Jeffers, R., Bradshaw, J.M., Soo, V.W., Breedy, M.R., Bunch, L., Kulkarni, S., Lott, J., Suri, N.: KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-Based Grid Architectures, pp. 32–41. Citeseer (2003)

    Google Scholar 

  11. Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, rei, and ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Kagal, L.: Rei: A Policy Language for the Me-centric Project. HP Labs, accessible online, pp. 1-23 (2002), http://www.hpl.hp.com/techreports.html

  13. Samarati, P., de Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Foundations of Security Analysis and Design, pp. 137–196 (2001)

    Google Scholar 

  14. Lampson, B.W.: Protection. ACM SIGOPS Operating Systems Review 8(1), 18–24 (1974)

    Article  MATH  Google Scholar 

  15. Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM 19, 461–471 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  16. Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236–243 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  17. Bell, D.E., Lapadula, L.J., Mitre, M.A.: orp Bedford. Secure Computer Systems: Mathematical Foundations 1(M74-244), 1–42 (1973)

    Google Scholar 

  18. Whitman, M.E., Mattord, H.J.: Management of Information Security, pp. 1–18. Course Technology Press, Boston (2004)

    Google Scholar 

  19. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing, pp. 1–9. IEEE, Los Alamitos (2009)

    Google Scholar 

  20. Padgham, L., Winikoff, M.: Developing Intelligent Agent Systems: A Practical Guide, pp. 1–240. Wiley, Chichester (2004); ISBN: 978-0-470-86120-2

    Book  Google Scholar 

  21. Fabio, B., Agostino, P., Giovanni, R.: JADE—A FIPA-Compliant Agent Framework CSELT Internal Technical Report. Part of this report has been also published in Proceedings of PAAM 1999, pp. 97–108 (1999)

    Google Scholar 

  22. Bellifemine, F.L., Poggi, A., Rimassa, G.: Developing multi-agent systems with JADE. In: Castelfranchi, C., Lespérance, Y. (eds.) ATAL 2000. LNCS (LNAI), vol. 1986, p. 89. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Agostino, P., Rimassa, G., Tomaiuolo, M.: Multi-User and Security Support for Multi-Agent Systems. In: Proceedings of WOA Workshop, Modena, Italy, pp. 1–7 (2001)

    Google Scholar 

  24. Bellifemine, F., Poggi, A., Rimassa, G.: Developing Multi-Agent Systems with a FIPA-Compliant Agent Framework. Software—Practice and Experience (31), 103–128 (2001)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Talib, A.M., Atan, R., Abdullah, R., Azmi Murad, M.A. (2011). Towards New Data Access Control Technique Based on Multi Agent System Architecture for Cloud Computing. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22410-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22410-2_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22409-6

  • Online ISBN: 978-3-642-22410-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics