Proceedings of the Third ACM Conference on Data and Application Security and Privacy 2013
DOI: 10.1145/2435349.2435389
|View full text |Cite
|
Sign up to set email alerts
|

Towards secure provenance-based access control in cloud environments

Abstract: As organizations become increasingly reliant on cloud computing for servicing their data storage requirements, the need to govern access control at finer granularities becomes particularly important. This challenge is increased by the lack of policy supporting data migration across geographic boundaries and through organizations with divergent regulatory policies. In this paper, we present an architecture for secure and distributed management of provenance, enabling its use in security-critical applications. P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
2

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(36 citation statements)
references
References 14 publications
(17 reference statements)
0
34
0
2
Order By: Relevance
“…The situation trust values which have been averaged over all situations to determine the trust in an agent of interest as has been described in [44]. A provenance system has been defined [4,45] on collection of subjects s, objects o, and attributes a. A subject s1 with attribute set a1 performs an action.…”
Section: Provenance Graph Computational Trust and Hierarchy Of Rolesmentioning
confidence: 99%
See 2 more Smart Citations
“…The situation trust values which have been averaged over all situations to determine the trust in an agent of interest as has been described in [44]. A provenance system has been defined [4,45] on collection of subjects s, objects o, and attributes a. A subject s1 with attribute set a1 performs an action.…”
Section: Provenance Graph Computational Trust and Hierarchy Of Rolesmentioning
confidence: 99%
“…A migration policy decision has been taken based on input object o1 and attribute set a1 associated with subject s1 and the state reached as a result of migration. The information transfer model developed in our work which includes network issues has relevance to the work described in [4]. The issue of network congestion and measuring its relevance has been described in [46][47][48].…”
Section: Provenance Graph Computational Trust and Hierarchy Of Rolesmentioning
confidence: 99%
See 1 more Smart Citation
“…O acesso é controlado por um procedimento que estabelece a identidade do cliente com algum grau de confiança (autenticação), e só então concede determinados privilégios (autorização) de acordo com esta identidade (BATES et al, 2013).…”
Section: Aspectos Críticos Abordadosunclassified
“…Essa variação está relacionada à quantidade de clientes. Bates et al (2013) propõem um modelo de controle de acesso para o problema de armazenamento de dados em computação em nuvem em data centers geograficamente distribuídos, nos quais podem haver problemas relacionados à proveniência dos dados. Os autores consideraram o gerenciamento e validação dos metadados de um sistema de proveniência confiável, e introduziram protocolos que permitem a transferência segura de metadados entre hospedeiros finais e entidades da nuvem.…”
Section: Análise Dos Mecanismosunclassified