Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy
نویسندگان
چکیده
Hierarchical multi-tenancy, which enables tenants to be divided into subtenants, is a flexible and scalable architecture for representing subsets of users and application resources in the real world. However, the resource isolation and sharing relations for tenants with hierarchies are more complicated than those between tenants in the flat Multi-Tenancy Architecture. In this paper, a hierarchical tenant-based access control model based on Administrative Role-Based Access Control in Softwareas-a-Service is proposed. Autonomous Areas and AA-tree are used to describe the autonomy and hierarchy of tenants, including their isolation and sharing relationships. AA is also used as an autonomous unit to create and deploy the access permissions for tenants. Autonomous decentralized authorization and authentication schemes for hierarchical multi-tenancy are given out to help different level tenants to customize efficient authority and authorization in large-scale SaaS systems. key words: Multi-Tenancy Architecture, hierarchical multi-tenancy, Rolebased Access Control Model, tenant-based access control model
منابع مشابه
Policy Based Framework for Trust Management and Evolution of Peer to Peer Groups
Peer to peer collaborative groups are becoming increasingly popular for collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games. The decentralized nature of these groups gives rise to the need of a secure group layer which integrates authentication, admission control, authorization, access control and key management. ...
متن کاملMulti-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client’s domain. For these services to be effectively enjoyed by organizations it is necessa...
متن کاملDistributed Authentication and Key Management in Wireless Mesh Networks
Authentication and Key Management (AKM) in Wireless Networks have been addressed in the IEEE 802.11i standard [10]. However, the IEEE 802.11s [21] Wireless Mesh Networks impose some further AKM requirements due to their large scale, distributed functionalities and decentralized authority. According to the IEEE 802.11s specifications, any security solutions should rely on IEEE 802.11i mechanisms...
متن کاملSemantic-aware multi-tenancy authorization system for cloud architectures
Cloud Computing is an emerging paradigm to offer on demand IT services to customers. The access control to resources located in the cloud is one of the critical aspects to enable business to shift into the cloud. Some recent works provide access control models suitable for the cloud, however there are important shortages that need to be addressed in this field. This work presents a step forward...
متن کاملIntegrated Framework for Authentication and Access Control in Peer to Peer Groups
Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 99-B شماره
صفحات -
تاریخ انتشار 2016