Cross tenant access control model for cloud computing. Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing. In this paper, we propose a cloud resource mediation service offered by cloud service providers, which plays the role of trusted third party among its different tenants. This paper formally specifies the resource sharing mechanism between two different tenants in the presence of our proposed cloud resource mediation service. The correctness of permission activation and delegation mechanism among different tenants using four distinct algorithms (Activation, Delegation, Forward Revocation and Backward Revocation) is also demonstrated using formal verification. The performance analysis suggest that sharing of resources can be performed securely and efficiently across different tenants of the cloud.
Cross tenant access control model for cloud computing
- Zhao et al. propose a cross-domain single sign on authentication protocol for cloud users, whose security was also proven mathematically. In the approach, the CSP is responsible for verifying the user’s identity and making access control decisions.
- As computing resources are being shared between tenants and used in an on-demand manner, both known and zeroday system security vulnerabilities could be exploited by the attackers (e.g. using side-channel and timing attacks).
- In existing, a fine grained data-level access control model (FDACM) designed to provide role-based and data-based access control for multi-tenant applications was presented. Relatively lightweight expressions were used to represent complex policy rules.
DISADVANTAGES OF EXISTING SYSTEM:
- Traditional access control models, such as role based access control, are generally unable to adequately deal with cross-tenant resource access requests.
- Specification level security is difficult to achieve at the user and provider ends.
- The security of the approach was not provided.
- We use model checking to exhaustively explore the system and verify the finite state concurrent systems. Specifically, we use High Level Petri Nets (HLPN) and Z language for the modeling and analysis of the CTAC model.
- We present a CTAC model for collaboration, and the CRMS to facilitate resource sharing amongst various tenants and their users.
- We also present four different algorithms in the CTAC model, namely: activation, delegation, forward revocation and backward revocation.
- We then provide a detailed presentation of modeling, analysis and automated verification of the CTAC model using the Bounded Model Checking technique with SMTLIB and Z3 solver, in order to demonstrate the correctness and security of the CTAC model.
ADVANTAGES OF PROPOSED SYSTEM:
- HLPN provides graphical and mathematical representations of the system, which facilitates the analysis of its reactions to a given input. Therefore, we are able to understand the links between different system entities and how information is processed.
- We then verify the model by translating the HLPN using bounded model checking. For this purpose, we use Satisfiability Modulo Theories Library (SMT-Lib) and solver. We remark that such formal verification has previously been used to evaluate security protocols
System : Pentium Dual Core.
Hard Disk : 120 GB.
Monitor : 15” LED
Input Devices : Keyboard, Mouse
Ram : 1 GB
Operating system : Windows 7.
Coding Language : JAVA/J2EE
Tool : Netbeans 7.2.1
Database : MYSQL
Book your project Now.
Checkout other projects here