6 CONCLUSIONS AND FUTURE
WORK
A multi-tenancy semantic-aware authorization model
based on CIM has been proposed for cloud comput-
ing scenarios. This authorization model enables high-
level authorization policies while overcoming certain
lacks of expresiveness of its predecessors and provid-
ing support for advanced authorization features such
as RBAC, hRBAC, cRBAC, HO and authorization
policies. Semantic Web tecnologies has been demon-
strated as useful for describing authorization models.
Moreover, the usage of the same language for ex-
pressing both information and authorization models
avoid any mismatch between the semantics of the in-
formation model and the semantics of the authoriza-
tion model, which in turn, is a a potential problem
available in most of the current authorization propos-
als.
As a future work, the implementation of an au-
thorization plug-in for the Eucalyptus open source
cloud provider, in which the authorization model ex-
plained here can be inserted in production scenarios
is a desised result. It is also expected for the com-
ing months to perform intensive performance anal-
ysis of the authorization model proposed in order
to stablish an analitical comparison of the trade-off
between language expressiveness and system perfor-
mance. Moreover, another expected work is the ex-
tension of the authorization model proposed in order
to include conflict detection capabilities in cloud com-
puting architectures.
ACKNOWLEDGEMENTS
This work has been partially funded by the project
”Secure Management of Information across multiple
Stakeholders (SEMIRAMIS)” CIP-ICT PSP-2009-3
250453, within the EC Seven Framework Programme
(FP7). Thanks also to the Funding Program for Re-
search Groups of Excellence granted by the Seneca
Foundation (04552/GERM/06). Authors also thank to
the the Seneca Foundation for the post-doctoral grant
15714/PD/10 sponsoring Jose M. Alcaraz Calero. Fi-
nally, authors would like to specially thanks Nigel Ed-
wards for his great contribution to the authorization
field.
REFERENCES
Alcaraz-Calero, J. M., Edwards, N., Kirschnick, J.,
Wilcock, L., and Wray, M. (2010a). Towards a multi-
tenancy authorization system for cloud services. IEEE
Security and Privacy, 8(6):48–55.
Alcaraz-Calero, J. M., Perez, G. M., and Skarmeta, A. F. G.
(2010b). Towards an authorization model for dis-
tributed systems based on the semantic web. IET In-
formation Security, 4(4):411–421.
Bumpus, W., Sweitzer, J. W., Thompson, P., Westerinen,
A., and Williams, R. C. (2000). Common information
model: implementing the object model for enterprise-
management. John Wiley & Sons, Inc.
Danwei, C., Xiuli, H., and Xunyi, R. (2009). Access control
of cloud service based on ucon. LNCS Cloud Comput-
ing, 5931:559–564.
Debusmann, M. and Keller, A. (2003). SLA-driven man-
agement of distributed systems using the common in-
formation model. In Proceeding of the 8th IFIP/IEEE
International Symposium on Integrated Network Man-
agement.
Hayes, B. (2008). Cloud computing. Communications of
the ACM, 51(7):9–11.
Heimbigner, D. (2004). DMTF - CIM to OWL: A Case
Study in Ontology Conversion. In Conference on Soft-
ware Engineering and Knowledge Engineering.
Horrocks, I., Patel-Schneider, P. F., Boley, H., andB.
Grosof, S. T., and Dean, M. (2004). SWRL: A Se-
mantic Web Rule Language combining OWL and
RULEML. Technical report, W3C.
Hu, L., Ying, S., Jia, X., and Zhao, K. (2009). Towards an
approach of semantic access control for cloud com-
puting. LNCS Cloud Computing, 5931:145–156.
Majewska, M., Kryza, B., and Kitowski, J. (2007). Trans-
lation of Common Information Model to Web Ontol-
ogy Language. LNCS Computational Science - ICCS
2007, 4487:414–417.
Mao, H., Huang, L., and Li, M. (2006). Web resource mon-
itoring based on common information model. In IEEE
Asia-Pacific Conference on Services Computing.
Park, J. and Sandhu, R. (2004). The ucon abc usage control
model. ACM Transactions on Information and System
Security, 7:128–174.
Perez, J. M. M., Bernabe, J. B., Alcaraz-Calero, J. M.,
Clemente, F. J. G., Perez, G. M., and Skarmeta, A.
F. G. (2011). Semantic-aware authorization architec-
ture for grid security. Future Generation Computer
Systems, 27:40–55.
SECRYPT 2011 - International Conference on Security and Cryptography
338