SlideShare a Scribd company logo
A Cross Tenant Access Control
(CTAC) Model for Cloud Computing:
Formal Specification and
Verification
ABSTRACT
• Sharing of resources on the cloud can be
achieved on a large scale since it is cost
effective and location independent.
• Despite the hype surrounding cloud
computing, organizations are still reluctant to
deploy their businesses in the cloud
computing environment due to concerns in
secure resource sharing.
CONTI..
• In this paper, we propose a cloud resource mediation service
offered by cloud service providers, which plays the role of
trusted third party among its different tenants.
• This paper formally specifies the resource sharing mechanism
between two different tenants in the presence of our
proposed cloud resource mediation service.
• The correctness of permission activation and delegation
mechanism among different tenants using four distinct
algorithms (Activation, Delegation,Forward Revocation and
Backward Revocation) is also demonstrated using formal
verification.
EXISTING SYSTEM
• Traditional access control models, such as role
based access control, are generally unable to
adequately deal with cross-tenant resource
access requests.
• However, takes the decidability problem as first
order logic formula and decides its satisfiability
based on the decidable background theory.
• The SMT-Lib provides a common input platform
for a number of solvers used in the verification of
systems. Behavioral specifications of a system can
also be represented using abstract models.
PROPOSED SYSTEM
• We present a CTAC model for collaboration, and
the CRMS to facilitate resource sharing amongst
various tenants and their users.
• We also present four different algorithms in the
CTAC model, namely: activation, delegation,
forward revocation and backward revocation.
• Role based access control (RBAC) enables fine-
grained access control (and generally in a single
domain). Different extensions of RBAC have been
proposed in the literature to support multi-
domain access control.
SYSTEM REQUIREMNTS
• HARDWARE REQUIREMENS
• System : Pentium IV 2.4 GHz.
• Hard Disk : 80 GB.
• Ram : 1 GB.
• SOFTWARE REQURIEMENTS
• Operating system : Windows 7.
• Coding Language: : C#
• IDE : VISUAL STUDIO
• Database : MS-SQLSERVER
CONCLUSTION
• In this paper, we proposed a cross-tenant
cloud resource mediation service (CRMS),
which can act as a trusted-third party for fine-
grained access control in a cross-tenant
environment.
• We also presented a formal model CTAC with
four algorithms designed to handle the
requests for permission activation.

More Related Content

PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PPTX
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
DOCX
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOCX
distributed, concurrent, and independent access to encrypted cloud databases
DOCX
Distributed, concurrent, and independent access to encrypted cloud databases
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...

What's hot (17)

DOCX
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
PDF
Concurrent And Independent Access To Encrypted Cloud Databases
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
PPTX
Privacy preserving public auditing
PPT
Privacy preserving public auditing for regenerating-code-based
DOC
Distributed, concurrent, and independent access to encrypted cloud databases
PDF
Locaweb cloud and sdn
PDF
A hybrid cloud approach for secure authorized deduplication
PPTX
Cloud Computing PPT
DOCX
Privacy preserving public auditing for secure cloud storage
PPTX
cloud computing preservity
DOCX
Cooperative provable data possession for
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
DOC
Oruta privacy preserving public auditing
DOCX
Privacy preserving delegated access control in public clouds
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
Concurrent And Independent Access To Encrypted Cloud Databases
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
Privacy preserving public auditing
Privacy preserving public auditing for regenerating-code-based
Distributed, concurrent, and independent access to encrypted cloud databases
Locaweb cloud and sdn
A hybrid cloud approach for secure authorized deduplication
Cloud Computing PPT
Privacy preserving public auditing for secure cloud storage
cloud computing preservity
Cooperative provable data possession for
Oruta privacy preserving public auditing for shared data in the cloud
Data Security Essentials for Cloud Computing - JavaOne 2013
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Oruta privacy preserving public auditing
Privacy preserving delegated access control in public clouds
Ad

Similar to A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification (20)

PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
PDF
Security policy enforcement in cloud infrastructure
RTF
Secure third party cloud computing services a proposal by shibwabo anyembe
PDF
Ms3422732277
PDF
A Threshold Secure Data Sharing Scheme for Federated Clouds
PDF
Analysis of a Pool Management Scheme for Cloud Computing Centres by Using Par...
PPTX
Security as a Service Model for Cloud Environment
PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
PPTX
Decentralized cloud firewall framework with resources provisioning cost optim...
PDF
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
PDF
Single Sign-on Authentication Model for Cloud Computing using Kerberos
PDF
Improving resource utilization in infrastructural cloud
PDF
IEEE Cloud computing 2016 Title and Abstract
PPTX
NIST CCRA.pptx for cloud computing and virtualization
PDF
Chapeter 2 introduction to cloud computing
PPTX
Failure aware resource provisioning for hybrid cloud infrastructure
PDF
Enhancing highly-collaborative access control system using a new role-mappin...
PDF
Cloud Ready Apps
DOCX
.Net ieee 2017 2018, Java IEEE Projects
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
Security policy enforcement in cloud infrastructure
Secure third party cloud computing services a proposal by shibwabo anyembe
Ms3422732277
A Threshold Secure Data Sharing Scheme for Federated Clouds
Analysis of a Pool Management Scheme for Cloud Computing Centres by Using Par...
Security as a Service Model for Cloud Environment
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Decentralized cloud firewall framework with resources provisioning cost optim...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Improving resource utilization in infrastructural cloud
IEEE Cloud computing 2016 Title and Abstract
NIST CCRA.pptx for cloud computing and virtualization
Chapeter 2 introduction to cloud computing
Failure aware resource provisioning for hybrid cloud infrastructure
Enhancing highly-collaborative access control system using a new role-mappin...
Cloud Ready Apps
.Net ieee 2017 2018, Java IEEE Projects
Ad

More from Prasadu Peddi (15)

PDF
Pointers
PDF
String notes
DOCX
B.Com 1year Lab programs
DOCX
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
DOCX
Energy-efficient Query Processing in Web Search Engines
DOCX
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
DOCX
GENERATING QUERY FACETS USING KNOWLEDGE BASES
DOCX
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
DOCX
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
DOCX
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
DOCX
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DOCX
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
PPTX
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
PPTX
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
PPTX
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Pointers
String notes
B.Com 1year Lab programs
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
Energy-efficient Query Processing in Web Search Engines
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
GENERATING QUERY FACETS USING KNOWLEDGE BASES
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Construction Project Organization Group 2.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
PPT on Performance Review to get promotions
PDF
composite construction of structures.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Digital Logic Computer Design lecture notes
PPTX
Geodesy 1.pptx...............................................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Construction Project Organization Group 2.pptx
573137875-Attendance-Management-System-original
PPT on Performance Review to get promotions
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Embodied AI: Ushering in the Next Era of Intelligent Systems
Digital Logic Computer Design lecture notes
Geodesy 1.pptx...............................................
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Sustainable Sites - Green Building Construction
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

  • 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
  • 2. ABSTRACT • Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. • Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing.
  • 3. CONTI.. • In this paper, we propose a cloud resource mediation service offered by cloud service providers, which plays the role of trusted third party among its different tenants. • This paper formally specifies the resource sharing mechanism between two different tenants in the presence of our proposed cloud resource mediation service. • The correctness of permission activation and delegation mechanism among different tenants using four distinct algorithms (Activation, Delegation,Forward Revocation and Backward Revocation) is also demonstrated using formal verification.
  • 4. EXISTING SYSTEM • Traditional access control models, such as role based access control, are generally unable to adequately deal with cross-tenant resource access requests. • However, takes the decidability problem as first order logic formula and decides its satisfiability based on the decidable background theory. • The SMT-Lib provides a common input platform for a number of solvers used in the verification of systems. Behavioral specifications of a system can also be represented using abstract models.
  • 5. PROPOSED SYSTEM • We present a CTAC model for collaboration, and the CRMS to facilitate resource sharing amongst various tenants and their users. • We also present four different algorithms in the CTAC model, namely: activation, delegation, forward revocation and backward revocation. • Role based access control (RBAC) enables fine- grained access control (and generally in a single domain). Different extensions of RBAC have been proposed in the literature to support multi- domain access control.
  • 6. SYSTEM REQUIREMNTS • HARDWARE REQUIREMENS • System : Pentium IV 2.4 GHz. • Hard Disk : 80 GB. • Ram : 1 GB. • SOFTWARE REQURIEMENTS • Operating system : Windows 7. • Coding Language: : C# • IDE : VISUAL STUDIO • Database : MS-SQLSERVER
  • 7. CONCLUSTION • In this paper, we proposed a cross-tenant cloud resource mediation service (CRMS), which can act as a trusted-third party for fine- grained access control in a cross-tenant environment. • We also presented a formal model CTAC with four algorithms designed to handle the requests for permission activation.