IDEAS home Printed from https://ideas.repec.org/a/igg/jcac00/v3y2013i4p28-37.html
   My bibliography  Save this article

Securing Data Storage By Extending Role-Based Access Control

Author

Listed:
  • Mamoon Rashid

    (Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India)

  • Er. Rishma Chawla

    (Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India)

Abstract

Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.

Suggested Citation

  • Mamoon Rashid & Er. Rishma Chawla, 2013. "Securing Data Storage By Extending Role-Based Access Control," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 3(4), pages 28-37, October.
  • Handle: RePEc:igg:jcac00:v:3:y:2013:i:4:p:28-37
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcac.2013100103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:3:y:2013:i:4:p:28-37. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.