Chi-Lun Liu. Access Control Policy Analysis and Access Denial Method for Cloud Services[J]. Journal of Electronic Science and Technology, 2013, 11(2): 176-180. DOI: 10.3969/j.issn.1674-862X.2013.02.009
Citation: Chi-Lun Liu. Access Control Policy Analysis and Access Denial Method for Cloud Services[J]. Journal of Electronic Science and Technology, 2013, 11(2): 176-180. DOI: 10.3969/j.issn.1674-862X.2013.02.009

Access Control Policy Analysis and Access Denial Method for Cloud Services

doi: 10.3969/j.issn.1674-862X.2013.02.009
More Information
  • Author Bio:

    Chi-Lun Liu esearch interests include electronic commerce security, software engineering, internet marketing, and social websites, tonyliu@mail.knu.edu.tw

  • Authors’ information: Chi-Lun Liu
  • Received Date: 2013-01-30
  • Rev Recd Date: 2013-03-21
  • Publish Date: 2013-06-24
  • Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.
  • Related Articles

    [1]Nyamsuren Vaanchig, Wei Chen, Zhi-Guang Qin. Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service[J]. Journal of Electronic Science and Technology, 2017, 15(1): 90-98. DOI: 10.11989/JEST.1674-862X.5121616
    [2]Hsueh-Ting Chu, Wei-Shan Tsai, Shao-Yu Lee. Design of a Cloud Service for Learning Chinese Pronunciation[J]. Journal of Electronic Science and Technology, 2014, 12(1): 54-58. DOI: 10.3969/j.issn.1674-862X.2014.01.011
    [3]Po-Chia Chiu, Anthony Y. H. Liao, Chin-Hung Liao, Yung-Nane Yang. Cloud-Based Supply Chain Integration Service Platform[J]. Journal of Electronic Science and Technology, 2013, 11(2): 201-208. DOI: 10.3969/j.issn.1674-862X.2013.02.014
    [4]Wen-Lung Shiau, Chao-Ming Hsiao. A Unified Framework of the Cloud Computing Service Model[J]. Journal of Electronic Science and Technology, 2013, 11(2): 150-160. DOI: 10.3969/j.issn.1674-862X.2013.02.006
    [5]Iuon-Chang Lin, Hsiao-Chi Chiang. A Novel Shopping Protocol for Ubiquitous Commerce[J]. Journal of Electronic Science and Technology, 2011, 9(4): 359-363. DOI: 10.3969/j.issn.1674-862X.2011.04.013
    [6]Ya-Fen Chang, Pei-Yu Chang. An Improved User Authentication and Key Agreement Scheme Providing User Anonymity[J]. Journal of Electronic Science and Technology, 2011, 9(4): 352-358. DOI: 10.3969/j.issn.1674-862X.2011.04.012
    [7]Chang-Ying Zhou, Chun-Ru Zhang. A Trusted Smart Phone and Its Applications in Electronic Payment[J]. Journal of Electronic Science and Technology, 2007, 5(3): 206-211.
    [8]LIU De-wen, LU Ruo-yu. Service Innovation Involved by Employees and Customers: From Conceptual Model to an IT Service Case[J]. Journal of Electronic Science and Technology, 2006, 4(4): 359-363.
    [9]WU Dan, WANG Hui-lin. Role of Ontology in Information Retrieval[J]. Journal of Electronic Science and Technology, 2006, 4(2): 148-154.
    [10]KWON Ohbyung. Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design[J]. Journal of Electronic Science and Technology, 2004, 2(3): 140-145.
  • Catalog

      Article Metrics

      Article views (376) PDF downloads (31) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return