Towards New Data Access Control Technique Based on Multi Agent System Architecture for Cloud Computing

作者: Amir Mohamed Talib , Rodziah Atan , Rusli Abdullah , Masrah Azrifah Azmi Murad

DOI: 10.1007/978-3-642-22410-2_23

关键词:

摘要: With the rise of era “cloud computing”, concerns about “Security” continue to increase. Cloud computing environments impose new challenges on access control techniques due growing scale and dynamicity hosts within cloud infrastructure; we proposed Multi-Agent System (MAS) architecture. This architecture consists two agents: Service Provider Agent (CSPA) Data Confidentiality (CDConA). CSPA provides a graphical interface user that facilitates services offered by system. CDConA each definition enforcement expressive flexible structure as logic formula over data file attributes. is named Formula-Based Access Control (FCDAC). A prototype our FCDAC will be designed using Prometheus Methodology implemented Java Development Framework Security (JADE-S).

参考文章(26)
M. Johnson, P. Chang, R. Jeffers, J. Bradshaw, M. Breedy, L. Bunch, S. Kulkami, J. Lott, N. Suri, A. Uszok, V.-W. Soo, Kaos Semantic Policy and Domain Services Springer, Boston, MA. pp. 119- 138 ,(2004) , 10.1007/0-387-23344-X_6
Dan Boneh, Hovav Shacham, Nagendra Modadugu, Eu-Jin Goh, SiRiUS: Securing Remote Untrusted Storage. network and distributed system security symposium. ,(2003)
Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, Andrzej Uszok, Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder international semantic web conference. pp. 419- 437 ,(2003) , 10.1007/978-3-540-39718-2_27
Giovanni Rimassa, Michele Tomaiuolo, Agostino Poggi, Multi-User and Security Support for Multi-Agent Systems. WOA. pp. 8- 13 ,(2001)
Matt Blaze, Joan Feigenbaum, John Ioannidis, Angelos D. Keromytis, The role of trust management in distributed systems security Secure Internet programming. pp. 185- 210 ,(2001) , 10.1007/3-540-48749-2_8
Stefano Paraboschi, Sara Foresti, Sabrina De Capitani di Vimercati, Sushil Jajodia, Pierangela Samarati, Over-encryption: management of access control evolution on outsourced data very large data bases. pp. 123- 134 ,(2007)
Herbert J. Mattord, Michael E. Whitman, Management Of Information Security ,(2004)
Kevin Fu, Ram Swaminathan, Erik Riedel, Qian Wang, Mahesh Kallahalla, Plutus: Scalable Secure File Sharing on Untrusted Storage file and storage technologies. pp. 3- 3 ,(2003)
Michael Wooldridge, Nicholas R. Jennings, Agent theories, architectures, and languages: a survey intelligent agents. pp. 1- 39 ,(1995) , 10.1007/3-540-58855-8_1
Michael Winikoff, Lin Padgham, Developing Intelligent Agent Systems: A Practical Guide ,(2004)