based on a structured hash table system. Both
solutions are stored in-memory. We tested these two
solutions against a traditional XACML-based
solution for the cloud. The performance discrepancy
between the traditional AC system and our ACT
based solutions is very important. Especially the
hash based ACT seems the more scalable and the
more adapted to cloud platforms.
ACKNOWLEDGEMENTS
This paper is done in the context of the PPP Fi-Ware
project and the FP7 EU COCO Cloud Project.
REFERENCES
G. Antonios, “Towards new access control models for
Cloud computing systems”, PhD report University of
Macedonia, Department of Applied Informatics
Z. Tang, J. Wei, A. Sallam, K. Li, R. Li, “ A New RBAC
Based Access Control Model for Cloud Computing”,
7th International Conference, GPC 2012, Hong Kong,
China, May 11-13, 2012. Proceedings, pp 279-288
OASIS. Extensible Access Control Markup Language
(xacml).https://www.oasis-open.org/committees/xacml
J. J. Bascou L. Gallon A. Gabillon, M. Munier and E.
Bruno, « An access control model for tree data
structures”. In ISC '02 Proceedings of the 5th
International Conf. on Information Security, 2002.
A. W. Leung, E. L. Miller, and S. Jones. Scalable security
for petascale parallel file systems. In SC ’07:
Proceedings of the 2007 ACM/IEEE conference on
Supercomputing, pages 1–12, New York, NY, USA,
2007. ACM. ISBN 978-1-59593-764-3. doi:
http://doi.acm.org/10.1145/1362622.1362644.
Z. Niu, H. Jiang, K. Zhou, T. Yang, and W. Yan.
Identification and authentication in large-scale storage
systems. Networking, Architecture, and Storage,
International Conference on, 0:421–427, 2009.
J. Hwang A.X. Liu, F. Chen and T. Xie. Designing fast
and scalable xacml policy evaluation engines. IEEE
Transactions on Computers, Dec 2011.
A. Squicciarini S. Maruf, M. Shehab and S.
Sundareswaran. Adaptive reordering and clustering
based framework for efficient xacml policy evaluation.
IEEE Transactions on Services Computing, Oct-Dec
2011.
J. Daly J. Brown and A. Gregory. The xengine policy
decision point for xacml 3.0. Computer security
project in Department of Computer Sciences at the
Michigan State University, 26 Oct 2011.
Popa, Lucian, Minlan Yu, Steven Y. Ko, Sylvia
Ratnasamy, and Ion Stoica. "CloudPolice: taking
access control out of the network." In Proceedings of
the 9th ACM SIGCOMM Workshop on Hot Topics in
Networks, p. 7. ACM, 2010.
Punithasurya K and Jeba Priya S. Article: Analysis of
Different Access Control Mechanism in Cloud.
International Journal of Applied Information Systems
4(2):34-39, September 2012. Published by Foundation
of Computer Science, New York, USA.
C.K. K. Reddy, P.R Anisha, K.S. Reddy, S.S. Reddy,
“Third Party Data Protection Applied To Cloud and
Xacml Implementation in the Hadoop Environment
With Sparql”, IOSR Journal of Computer Engineering
(IOSRJCE) ISSN: 2278 - 0661 Volume 2, Issue 1
(July - Aug. 2012), PP 39 – 46
Reeja S L, “Role Based Access Control Mechanism in
Cloud Computing using co-operative secondary
authorization Recycling Method”, 2012. International
Journal of Emerging Technology and Advanced
Engineering Website: www.ijetae.com (ISSN pp.
2250-2459, Volume 2, Issue 10, October 2012)
Amazon Simple Storage Service (Amazon S3). Amazon,
b. http://aws.amazon.com/s3/.
Windows Azure Platform. Microsoft, a. http://
www.microsoft.com/windowsazure/windowsazure/.
Atmos Online Programmer’s Guide. EMC, a. https://
community.emc.com/docs/DOC-3481, accessed Jan
12, 2010.
D. Harnik, E. K. Kolodner, S. Ronen, J. Sataran, A.
Shulman-Peleg, S. Tal,”Secure Access Mechanism for
Cloud Storage”, Journal of Scalable Computing:
Practice and Experience Volume 12, Number 3, pp.
317–336. http://www.scpe.org
HERAS-AF XACML - University of Applied Sciences
Rapperswil. http://www.herasaf.org/
SAP HANA Cloud Portal http://scn.sap.com/
community/hana-cloud-portal
Apach Derby http://db.apache.org/derby/
Redis Database http://redis.io/
Plattner, H. "A common database approach for OLTP and
OLAP using an in-memory column database."
Proceedings of the 2009 ACM SIGMOD International
Conference on Management of data. ACM, 2009.
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
558