You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/315798618

Access Control and User Authentication Concerns in cloud Computing


Environments

Article · May 2015

CITATIONS READS

3 137

5 authors, including:

Milad Chizari Mohammad Ahmadi

3 PUBLICATIONS 23 CITATIONS
Asia Pacific University of Technology and Innovation
21 PUBLICATIONS 309 CITATIONS
SEE PROFILE
SEE PROFILE

Mohammad Eslami Mohammad Javad Golkar


Islamic Azad University, Chabahar International Branch Islamic Azad University, Shiraz, Iran
24 PUBLICATIONS 464 CITATIONS 11 PUBLICATIONS 286 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Milad Chizari on 06 April 2017.

The user has requested enhancement of the downloaded file.


Acceess Coontrol and U
User Authen
A nticatioon Co
oncernns
in Cloud
C Compputing
g Enviironmeents
1 2
Mohammaad Ahmadi Miladd Chizari
Faculty of Computing
C Dept.
D of Electtrical Engineering
Asia
A Pacific U
University of Technology
T an
nd Innovation Yadegaar -e- Imam KhKhomeini (RAH H) Branch,
Kuala Lumpuur, Malaysia Islammic Azad Uniiversity, Tehraan, Iran
ahmadi@appu.edu.my milad.chizaari@yahoo.com m

3 4 5
Mohamm
mad Eslami Moham
ammad Javad
d Golkar Mostaafa Vali
Dept.
D of Electriical & Compuuter, Faculty off Electrical and
d Computer Faculty of Computing
C
College
C of Enggineering, Islammic Imam Mohhamad Bagherr University Asia Pacificc University
Azad
A Universitty, Zahedan, Iran
I Sari, Iran Kuala Lumpur, Malaysia
mohammad.es
m slami@chmaill.ir javad.goolkar.1368@gm mail.com ahmadi@aapu.edu.my

Abbstract— Clou ud computing is i a newfound d service that h has a research area and specific detai
ails about the identified
i issuues in
rapidd growth in IIT industry during
d recent years. Despitte the acceess control and
d user authenttication researrches.
nology there arre some issues such
severral advantagess of this techn
as security
s and privacy that affect the reliability of ccloud
comp puting models.. Access controol and user autthentication arre the
mostt important seecurity issues in cloud com mputing. Thereefore, II.. CLOUD COM THE MOST CHALLENGING ISSUE
MPUTING AND T S
the research haas been prep pared to pro ovide the ovverall Cloud computing is new w model of widely
w distribbuted
inforrmation aboutt this securityy concerns and specific d details commputing that ussers the conceepts of virtualiization and stoorage
abouut the identtified issues in access control c and user
to store
s resourcees and share them betweeen computerss and
auth
hentication ressearches. Therrefore, cloud computing
c bennefits
and disadvantagess have been explained
e in the
t first part.. The otheer devices [1]. In this emergging technoloogy, users cann deal
seconnd part revviewed some of access control c and user with
h a service without anyy clue of where w the actual
a
auth
hentication aalgorithms an nd identifyin ng benefits and infra
astructure is located
l and wwhat technolo ogy is used beehind
weakknesses of eacch algorithm. The main aim m of this survvey is the scenes to manage
m and ccontrol the infrastructure
i e [2].
considering limitattions and probblems of previous research iin the Desp pite to the sev
veral advantagges of cloud computing
c such as
reseaarch area to ffind out the most
m challenging issue in aaccess unlimmited storagee and increasining the efficieency of compputing
contrrol and user au
uthentication algorithms.
a proccesses, there are
a several cooncerns abou ut the securityy and
privacy in cloud computing
c ennvironments. Figure
F 1 show ws the
Index Terms — Cloud Coomputing, Acccess Control, User
Auth
hentication, Seecurity, Privacyy.
advaantages and diisadvantages oof cloud comp puting in brieff [3].

I. INTRO
ODUCTION

Cloud
C computting is a neewfound tech hnology thatt has
undeeniable grow wth in IT inddustry. This survey has been
pared accordinng to three main purposes: The first purrpose
prep
is describing
d an overall overrview about cloud compuuting
conccepts, securityy issues in clloud computin ng, access coontrol
methhods, and challlenging issuees in user authentication proocess.
The second aim iis reviewing some
s of accesss control andd user
auth
hentication aalgorithms annd identifyin ng benefits and
weak knesses of eaach algorithm. The last goaal of this survvey is
conssidering limitaations and prooblems of preevious researcch in
the research areaa to find out the most challenging issuue in
acceess control andd user authenttication algoritthms.
According
A to tthese tasks, the
t research has
h been preppared
and described to provide the overall inforrmation abouut the
Fig.
F 1. Pros and C
Cons in Cloud Com
mputing
One of the most challenging issues in cloud computing Attribute Set Based Encryption and Access Control Model
environments is managing access controls and user (ASBE).
authentication in public and private cloud and for sharing or
In 2010, Li et al. [6] proposed a model to achieve fine-
individual processes [4]. According to these issues, there are
grained access control based on attribute encryption by
many algorithms and models that were identified and
preventing the illegal key sharing among colluding users is
described by several researchers to resolve these challenging
missing from the existing access control systems based on
problems. Some of these algorithms and models have been
attribute based encryption. For this purpose, access control
described in next section to identifying the strengths and
policies based on data attributes was defined and enforced.
weaknesses of each research or product.
Moreover, in this model, user accountability was implemented
by using traitor tracing and broadcast encryption methods to
support user grant and revocation. The following figure shows
III. ACCESS CONTROLS AND USER AUTHENTICATION MODELS the architecture of the suggested model by Li et al. (2010): in
There are several access control and user authentication this model, user accountability was implemented by using
models that were proposed to enhance the rate of reliability in traitor tracing and broadcast encryption methods to support
cloud computing environments. Wan et al. [5] proposed a user grant and revocation. Figure 3 shows the architecture of
cloud computing model with five types of parties: the suggested model by Li et al. (2010):

 Data storage service was provided by Cloud Service


Provider (CSP) by managing cloud servers.
 Data files were encrypted by Data Owners and were
stored in cloud servers to sharing with others.
 Encrypted data files were downloaded and decrypted
by Data Consumers according to their interest and
permissions.
 Domain Authority is a service to access data owners
and data consumers according to administration rules.
 Truseted Authority manages domain authority
according to the rules of parents domain authority
Figure 2 (Wan et al. 2012) shows these five parties in
details: Fig. 3. Architecture of Li's Model (Li et al. 2010)

According to this figure, the proposed model analysis


shows that this confidentiality and fine-grained access control
is efficient and practical in real cloud computing environments
but in this model the granularity is limited by the size of the
attribute set that is associated with the encryption. This is the
most challenging weakness of this model.
Wang et al. [7] suggested an adaptive access control
model by trust introduction in cloud computing environments
by using role based access control methods to resource
Fig. 2. Cloud Computing Five Parties (Wan et al. 2012) management and access control decision during the
communication processes in cloud computing environments.
Moreover in the proposed model, a dynamic and trust
According to this model, domain authorities are managed
based access model was suggested to determine the security
by trusted authority and by this management, data owner and
level and access control based on dynamic user authentication
data customers trust about the access control and their
and controlling the user's malicious behaviour effectively.
permissions. Moreover Wan’s proposed model by is based on
Figure 4 shows the Wang’s (2011) dynamic and trust based in
hierarchical attribute based encryption by extending the
brief:
attribute policy with a hierarchical structure of users. This
model provides scalability due the defined structure and fine-
grained access control and flexibility in comparison with
By using this model, deelegation of mostm computtation
overrhead to poweerful cloud serrvers could be possible forr data
ownner and confid dentiality of user access privilege
p and user
secret key accountability migh ght be achieveed. An exem mplary
casee in the proposed model inn a healthcare scenario has been
show ng figure (Yu et al. 2010):
wn in followin

Fig. 4. Wanng's Access Contrrol Model (Wang


g et al. 2011)

According to this figure, a dynamic and trust based acccess


moddel was sugggested to deteermine the security
s levell and
acceess control bbased on dynnamic user authentication
a n and
conttrolling the uuser's malicioous behaviourr effectively. The
mostt important aadvantage off this model is extendingg the
trustted computingg technology tot the commuunications in ccloud
commputing enviroonments to increase
i the reliability off this
Fig. 6. An exem
mplary case in heaalthcare scenario (Yu et al. 2010)
newfound technollogy.
Because of tthe weaknessses of Wang’’s model, a ttrust-
baseed dynamic aaccess controol model for cloud compuuting For achievingg to the purpooses of this mo odel, each datta file
enviironment was presented by Tan et al. [8] for legal idenntities the owner assign ns a set of m meaningful attrributes, whichh are
dation and privvileges accesss control acqu
valid uiring for resouurces neceessary for acceess control. Th
These attributees need a hugee data
by users
u accordinng to role bassed and trust based techniqques. head
der for each data packet.. The following figure (22010)
The authorizationn flow of thhis trust-based d dynamic acccess show
ws an examplee for data headder in the prop posed model:
conttrol model hass been shown in figure 5 (Taan et al. 20100):

Fiig. 5. The authoriization flow of acccess control mod


del (Tan et al. 20110)
Fig. 7. Yu'ss Model Attributees Definition (Yu
u et al. 2010)
According too Figure 5, thet theoreticaal analysis off the
Tan’’s model shoowed that thhe proposed model mighht be
In 2012, a matrix baseed access co ontrol model was
effecctive for proviiding a dynam
mic a secure acccess control.
presented by Ilan nchezhian et aal. [10] to immprove the cuurrent
Yu et al. [9] described a schemee based on data secuurity model and efficiiency in cloud c computing
confifidentiality, annd scalability simultaneoussly to implem
ment a enviironments. “In n access matrrix model, wheen a subject wants
w
fine grained dataa access conttrol in cloud environmentts by to access
a an object already tthe access rig ghts to accesss the
explloiting key policy attributte based encrryption and uusing subjject by a correesponding objject will be sttored.” Becauuse of
prox
xy and lazy re--encryption teechniques. this reason, when n a subject reequests to access an objecct for
read
ding or writingg process everry time, the acccess is not graanted
direcctly instead th
he table is chhecked first. Using
U data hiiding,
partial request and data grouping techniques helped the The results showed that each model has specific strengths
proposed algorithm to decrease the taken time for unwatched and also weaknesses, and none of them could provide all of
requests by eliminating several requests. the users and enterprises expectations about a security model
in cloud computing environments. Having said and according
F. Fatemi Moghaddam [11] suggested a cloud-based
the security concerns that still unclear in cloud computing
single-sign-on algorithm as an effective solution to increase
communications, a harder efforts seem to be necessary to find
the efficiency of user authentication processes in cloud-based
out a reliable and more efficient user authentication and access
applications according to the limitations [12] and weaknesses
control model in cloud-based environments.
of similar client-based models. The proposed model was
designed and described by establishing two cloud servers for
storing encrypted account details and cryptography keys.
Moreover, a cloud-based SaaS application was designed to REFERENCES
connect clients and SaaS service providers. Using AES-256
and SSL in the suggested model improves the security of [1] F. Fatemi Moghaddam, O. Karimi, and M. T. Alrashdan, “A
cloud-based SSO algorithm. Comparative Study of Applying Real-Time Encryption in Cloud
Computing Environments,” in Proc. of 2nd International
In addition, Fatemi Moghaddam et al. [13] proposed an Conference on Cloud Networking (CloudNet), San Francisco,
efficient and scalable user authentication scheme in 2014. In CA, 2013, pp. 185–189.
the suggested model, various tools and techniques were [2] Baker, M. Mackay, and M. Randles, “Eternal Cloud
introduced and used by using the concept of agent. Therefore, Computation Application Development.” Developments in E-
a client-based user authentication agent was introduced to systems Engineering (DeSE), pp. 392-397, 2011.
confirm identity of the user in client-side. Furthermore, a [3] Dion Hinchcliffe, “Eight ways that cloud computing will change
cloud-based software-as-a-service application was used to business,” ZDnet Website, 2011, [Online] Available on:
confirm the process of authentication for un-registered http://www.zdnet.com/blog/hinchcliffe/eight-ways-that-cloud-
computing-will-change-business/488, Last Accessed: May 4th,
devices. Moreover, there are two separate servers for storing
2014.
authentication and cryptography resources from main servers
to decrease the dependency of user authentication and [4] F. Fatemi Moghaddam, N. Khanezaei, S. Manavi, M.
encryption processes from main server. Cryptography agent Eslami, and A. Samar, “UAA: User Authentication Agent
was also introduced to encrypt resources before storing on for Managing User Identities in Cloud Computing
cloud servers. In overall, the theoretical analysis of the Environments,” in IEEE 5th Control and System
suggested scheme showed that, designing this user Graduate Research Colloquium (ICSGRC), Shah Alam,
authentication and access control model will enhance the Malaysia, 2014, pp. 208–212.
[5] Z. Wan, J. Liu, and R.H. Deng, “HASBE: A Hierarchical
reliability and rate of trust in cloud computing environments.
Attribute-Based Solution for Flexible and Scalable Access
According to the process of reviewing performed Control in Cloud Computing” IEEE Transactions on
researches and manufactured products, several models were Information Forensics and Security, vol.7, no.2, pp. 743-754,
proposed and presented to resolve the security problems such 2012.
as user authentication, access control management, and [6] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong. W, Li, L, Tang, and
personalization process in cloud computing environments. Y. Tang, “Fine-Grained Data Access Control Systems with User
Accountability in Cloud Computing,” in Proc. of IEEE Second
However, each model has specific strengths and also
International Conference on Cloud Computing Technology and
weaknesses. Science (CloudCom), 2010, pp. 89-96.
[7] W. Wang, J. Han, M. Song, and X. Wang “The Design of a
Trust and Role Based Access Control Model in Cloud
IV. CONCLUSION Computing,” in Proc. of 6th International Conference on
In this paper user authentication and access control Pervasive Computing and Applications (ICPCA), 2011, pp. 330-
334.
concerns in cloud computing environments were considered.
As was explained, security concerns are the most challenging [8] Z. Tan, Z. Tang, R. Li, A. Sallam, and L. Yang “Research on
trust-based access control model in cloud computing,”in Proc. of
issues in cloud computing environments as an emerging
6th IEEE Joint International Information Technology and
technology. Hence, access control and user authentication Artificial Intelligence Conference (ITAIC), 2011, vol.2, pp. 339-
procedures as two of the most important parts of security 344.
issues [14] have been specified in this research. Therefore, [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure,
cloud computing benefits and disadvantages were explained in Scalable, and Fine-grained Data Access Control in Cloud
the first part. The second part reviewed some of access control Computing,” in Proc. of IEEE INFOCOM, 2010, pp. 1-9.
and user authentication algorithms and identifying benefits and [10] J. Ilanchezhian, V. Varadharassu, A. Ranjeeth, and K. Arun, “To
weaknesses of each algorithm. The main aim of this survey is improve the current security model and efficiency in cloud
considering limitations and problems of previous research in computing using access control matrix,” in Proc. of Third
the research area to find out the most challenging issue in International Conference on Computing Communications &
access control and user authentication algorithms. Networking Technologies (ICCCNT), 2012, pp. 1-5.
[11] F. Fatemi Moghaddam, O. Karimi, and M. Hajivali, “Applying a
Single Sign-On Algorithm based on Cloud Computing Concepts
for SaaS Applications,” in IEEE Malaysia International
Conference on Communications (MICC), 2013, pp. 335–339.
[12] J. Ju, Y. Wang, J. Fu, J. Wu, and Z. Lin, “Research on Key
Technology in SaaS,” in Proc. International Conf. on Intelligent
Computing and Cognitive Informatics (ICICCI), Kuala Lumpur,
2010, pp. 384-387.
[13] F. Fatemi Moghaddam, S. Gerayeli Moghaddam, S. Rouzbeh, S.
Kohpayeh Araghi, N. Morad Alibeigi, and S. Dabbaghi
Varnosfaderani, “A Scalable and Efficient User Authentication
Scheme for Cloud Computing Environments,” in IEEE Region
10 Symposium, 2014, pp. 508–513.
[14] F. Fatemi Moghaddam, R. Roshan Ravan, T. Khodadadi,
Y. Javadianasl, and A. Halalzadeh, “SUAS: Scalable User
Authentication Scheme for Secure Accessing to Cloud-
Based Environments,” in IEEE Symposium on Computer
Applications and Industrial Electronics (ISCAIE),
Penang, Malaysia, 2014, pp. 33–38.

View publication stats

You might also like