PCM in cloud
PCM in cloud.Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes.
We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service.
Similar IEEE Project Titles
- FRESH: Fair and Efficient Slot Configuration and Scheduling for Hadoop Clusters
- Diagnosing Virtualized Hadoop Performance from Benchmark Results: An Exploratory Study
- A Processing Pipeline for Cassandra Datasets Based on Hadoop Streaming
- Scaling Hadoop clusters with virtualized volunteer computing environment
- HaSTE: Hadoop YARN Scheduling Based on Task-Dependency and Resource-Demand