variety of files in various formats. Future work will
focus on improving the granularity of policies to al-
low for selective disclosure of data. This granularity
could be extended to database entries where the one
single row can be identified by DataID and selective
disclosure can be provided for various items repre-
sented by columns of that row. A private cloud was
used as a testbed to perform the validation of the sys-
tem. Future work will examine the issues around run-
ning the authorization system on public clouds. For
example, in a federated cloud scenario, how well do
the region boundaries of each provider correlate with
those of the others?
Future work will also focus on how to integrate
location awareness into open cloud platforms such
as OpenStack. For OpenStack, obvious integration
points include: Horizon, the web-based dashboard
that controls all OpenStack components; Keystone,
which manages the authentication and authorization
of services and users; Swift, which provides object
store funtionality; and Cinder, which provides block
storage. OpenStack supports the concepts of geo-
graphically dispersed regions with separate endpoints
(Jackson, 2012), providing a good fit with the data
control model described in Section 4. Under this sce-
nario, one Keystone and Horizon is shared between
the regions to provide a common access control and
dashboard, while distributed Swift and Cinder com-
ponents allow for complete separation of storage by
region. The object storage functionality provided by
Swift provides an easier starting point for the integra-
tion of location control compared to Cinder as it deals
with named, atomic units of data. A first step will
to be to allow location preferences to be associated
with users and Swift objects, and to provide an API
that allows developers to check the permissibility of
copying objects from one region to another.
ACKNOWLEDGEMENTS
The research work described in this paper was sup-
ported by the Irish Centre for Cloud Computing
and Commerce, an Irish national Technology Centre
funded by Enterprise Ireland and the Irish Industrial
Development Authority.
REFERENCES
Albeshri, A., Boyd, C., and Nieto, J. (2012). Geoproof:
Proofs of geographic location for cloud computing en-
vironment. In Distributed Computing Systems Work-
shops (ICDCSW), 2012 32nd International Confer-
ence on, pages 506–514.
Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., and
Ghafoor, A. (2012). A distributed access control
architecture for cloud computing. Software, IEEE,
29(2):36–44.
Anderson, A. (2005). OASIS extensible access control
markup language (XACML) version 2.0. OASIS Stan-
dard, 1.
Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter,
M. (2003). Enterprise privacy authorization language
(epal 1.2). Submission to W3C.
Basescu, C., Carpen-Amarie, A., Leordeanu, C., Costan,
A., and Antoniu, G. (2011). Managing data access on
clouds: A generic framework for enforcing security
policies. In Advanced Information Networking and
Applications (AINA), 2011 IEEE International Con-
ference on, pages 459–466.
Benson, K., Dowsley, R., and Shacham, H. (2011). Do you
know where your cloud files are? In Proceedings of
the 3rd ACM workshop on Cloud computing security
workshop, pages 73–82. ACM.
Chadwick, D., Zhao, G., Otenko, S., Laborde, R., Su, L.,
and Nguyen, T. A. (2008). PERMIS: a modular au-
thorization infrastructure. Concurrency and Compu-
tation: Practice and Experience, 20(11):1341–1357.
Chadwick, D. W. and Fatema, K. (2012). A privacy pre-
serving authorisation system for the cloud. Journal of
Computer and System Sciences, 78(5):1359–1373.
Chen, D. and Zhao, H. (2012). Data security and privacy
protection issues in cloud computing. In Computer
Science and Electronics Engineering (ICCSEE), 2012
International Conference on, volume 1, pages 647–
651. IEEE.
Cranor, L. F. (2003). P3P: Making privacy policies more
useful. Security & Privacy, IEEE, 1(6):50–55.
Demchenko, Y., Koeroo, O., de Laat, C., and Sagehaug,
H. (2008). Extending XACML authorisation model
to support policy obligations handling in distributed
application. In Proceedings of the 6th international
workshop on Middleware for grid computing, page 5.
ACM.
di Vimercati, S. D. C., Samarati, P., and Jajodia, S. (2005).
Policies, models, and languages for access control. In
Databases in Networked Information Systems, pages
225–237. Springer.
Fatema, K., Chadwick, D. W., and Lievens, S. (2011). A
multi-privacy policy enforcement system. In Privacy
and Identity Management for Life, pages 297–310.
Springer.
Godik, S., Anderson, A., Parducci, B., Humenn, P., and Va-
jjhala, S. (2002). Oasis extensible access control 2
markup language (xacml) 3. Technical report, Tech.
rep., OASIS.
Gondree, M. and Peterson, Z. N. (2013). Geolocation of
data in the cloud. In Proceedings of the third ACM
conference on Data and application security and pri-
vacy, pages 25–36. ACM.
Iskander, M. K., Wilkinson, D. W., Lee, A. J., and Chrysan-
this, P. K. (2011). Enforcing policy and data consis-
AUserDataLocationControlModelforCloudServices
487