SlideShare a Scribd company logo
A Cross Tenant Access Control
(CTAC) Model for Cloud Computing:
Formal Specification and
Verification
ABSTRACT
• Sharing of resources on the cloud can be
achieved on a large scale since it is cost
effective and location independent.
• Despite the hype surrounding cloud
computing, organizations are still reluctant to
deploy their businesses in the cloud
computing environment due to concerns in
secure resource sharing.
CONTI..
• In this paper, we propose a cloud resource mediation service
offered by cloud service providers, which plays the role of
trusted third party among its different tenants.
• This paper formally specifies the resource sharing mechanism
between two different tenants in the presence of our
proposed cloud resource mediation service.
• The correctness of permission activation and delegation
mechanism among different tenants using four distinct
algorithms (Activation, Delegation,Forward Revocation and
Backward Revocation) is also demonstrated using formal
verification.
EXISTING SYSTEM
• Traditional access control models, such as role
based access control, are generally unable to
adequately deal with cross-tenant resource
access requests.
• However, takes the decidability problem as first
order logic formula and decides its satisfiability
based on the decidable background theory.
• The SMT-Lib provides a common input platform
for a number of solvers used in the verification of
systems. Behavioral specifications of a system can
also be represented using abstract models.
PROPOSED SYSTEM
• We present a CTAC model for collaboration, and
the CRMS to facilitate resource sharing amongst
various tenants and their users.
• We also present four different algorithms in the
CTAC model, namely: activation, delegation,
forward revocation and backward revocation.
• Role based access control (RBAC) enables fine-
grained access control (and generally in a single
domain). Different extensions of RBAC have been
proposed in the literature to support multi-
domain access control.
SYSTEM REQUIREMNTS
• HARDWARE REQUIREMENS
• System : Pentium IV 2.4 GHz.
• Hard Disk : 80 GB.
• Ram : 1 GB.
• SOFTWARE REQURIEMENTS
• Operating system : Windows 7.
• Coding Language: : C#
• IDE : VISUAL STUDIO
• Database : MS-SQLSERVER
CONCLUSTION
• In this paper, we proposed a cross-tenant
cloud resource mediation service (CRMS),
which can act as a trusted-third party for fine-
grained access control in a cross-tenant
environment.
• We also presented a formal model CTAC with
four algorithms designed to handle the
requests for permission activation.

More Related Content

What's hot

JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
JPJ1406   Distributed, Concurrent, and Independent Access to Encrypted Cloud ...JPJ1406   Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
chennaijp
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases
Editor IJMTER
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEEMEMTECHSTUDENTPROJECTS
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
vmshimavm
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
Nagamalleswararao Tadikonda
 
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesDistributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
Papitha Velumani
 
Locaweb cloud and sdn
Locaweb cloud and sdnLocaweb cloud and sdn
Locaweb cloud and sdn
Gleicon Moraes
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
Cloud Computing PPT
Cloud Computing PPTCloud Computing PPT
Cloud Computing PPT
Aakanksha Mane
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
IEEEFINALYEARPROJECTS
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
IMPULSE_TECHNOLOGY
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
Adz91 Digital Ads Pvt Ltd
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
JSPM's JSCOE , Pune Maharashtra.
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
Papitha Velumani
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 

What's hot (17)

JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
JPJ1406   Distributed, Concurrent, and Independent Access to Encrypted Cloud ...JPJ1406   Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesDistributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
 
Locaweb cloud and sdn
Locaweb cloud and sdnLocaweb cloud and sdn
Locaweb cloud and sdn
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Cloud Computing PPT
Cloud Computing PPTCloud Computing PPT
Cloud Computing PPT
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 

Similar to A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

unit3.ppt
unit3.pptunit3.ppt
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
Consistency as a Service: Auditing Cloud Consistency
Consistency as a Service: Auditing Cloud ConsistencyConsistency as a Service: Auditing Cloud Consistency
Consistency as a Service: Auditing Cloud Consistency
Papitha Velumani
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
sree raj
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
SwarnaSLcse
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
DineshKumar746335
 
unit3 part1.pptx
unit3 part1.pptxunit3 part1.pptx
unit3 part1.pptx
Janpreet Singh
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
IEEEFINALSEMSTUDENTPROJECTS
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
ZTech Proje
 
sla nptl.pptx
sla nptl.pptxsla nptl.pptx
sla nptl.pptx
MunmunSaha7
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
AngelineR
 
B03410609
B03410609B03410609
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
hnandy
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
Haribabu Nandyal Padmanaban
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
chennaijp
 
T04503113118
T04503113118T04503113118
T04503113118
IJERA Editor
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
Siva453615
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
haileysuszelalem
 

Similar to A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification (20)

unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Consistency as a Service: Auditing Cloud Consistency
Consistency as a Service: Auditing Cloud ConsistencyConsistency as a Service: Auditing Cloud Consistency
Consistency as a Service: Auditing Cloud Consistency
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
 
unit3 part1.pptx
unit3 part1.pptxunit3 part1.pptx
unit3 part1.pptx
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
sla nptl.pptx
sla nptl.pptxsla nptl.pptx
sla nptl.pptx
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
B03410609
B03410609B03410609
B03410609
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
 
Cloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platformsCloud computing Fundamentals - behind the hood of cloud platforms
Cloud computing Fundamentals - behind the hood of cloud platforms
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
 
T04503113118
T04503113118T04503113118
T04503113118
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
 

More from Prasadu Peddi

Pointers
PointersPointers
Pointers
Prasadu Peddi
 
String notes
String notesString notes
String notes
Prasadu Peddi
 
B.Com 1year Lab programs
B.Com 1year Lab programsB.Com 1year Lab programs
B.Com 1year Lab programs
Prasadu Peddi
 
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHSCOMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
Prasadu Peddi
 
Energy-efficient Query Processing in Web Search Engines
Energy-efficient Query Processing in Web Search EnginesEnergy-efficient Query Processing in Web Search Engines
Energy-efficient Query Processing in Web Search Engines
Prasadu Peddi
 
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETSMINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
Prasadu Peddi
 
GENERATING QUERY FACETS USING KNOWLEDGE BASES
GENERATING QUERY FACETS USING KNOWLEDGE BASESGENERATING QUERY FACETS USING KNOWLEDGE BASES
GENERATING QUERY FACETS USING KNOWLEDGE BASES
Prasadu Peddi
 
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGEUNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
Prasadu Peddi
 
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
Prasadu Peddi
 
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
Prasadu Peddi
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
Prasadu Peddi
 
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINESDYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
Prasadu Peddi
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Prasadu Peddi
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Prasadu Peddi
 
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Prasadu Peddi
 

More from Prasadu Peddi (15)

Pointers
PointersPointers
Pointers
 
String notes
String notesString notes
String notes
 
B.Com 1year Lab programs
B.Com 1year Lab programsB.Com 1year Lab programs
B.Com 1year Lab programs
 
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHSCOMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
 
Energy-efficient Query Processing in Web Search Engines
Energy-efficient Query Processing in Web Search EnginesEnergy-efficient Query Processing in Web Search Engines
Energy-efficient Query Processing in Web Search Engines
 
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETSMINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
 
GENERATING QUERY FACETS USING KNOWLEDGE BASES
GENERATING QUERY FACETS USING KNOWLEDGE BASESGENERATING QUERY FACETS USING KNOWLEDGE BASES
GENERATING QUERY FACETS USING KNOWLEDGE BASES
 
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGEUNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
 
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
 
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
 
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINESDYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
 
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
 
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

  • 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
  • 2. ABSTRACT • Sharing of resources on the cloud can be achieved on a large scale since it is cost effective and location independent. • Despite the hype surrounding cloud computing, organizations are still reluctant to deploy their businesses in the cloud computing environment due to concerns in secure resource sharing.
  • 3. CONTI.. • In this paper, we propose a cloud resource mediation service offered by cloud service providers, which plays the role of trusted third party among its different tenants. • This paper formally specifies the resource sharing mechanism between two different tenants in the presence of our proposed cloud resource mediation service. • The correctness of permission activation and delegation mechanism among different tenants using four distinct algorithms (Activation, Delegation,Forward Revocation and Backward Revocation) is also demonstrated using formal verification.
  • 4. EXISTING SYSTEM • Traditional access control models, such as role based access control, are generally unable to adequately deal with cross-tenant resource access requests. • However, takes the decidability problem as first order logic formula and decides its satisfiability based on the decidable background theory. • The SMT-Lib provides a common input platform for a number of solvers used in the verification of systems. Behavioral specifications of a system can also be represented using abstract models.
  • 5. PROPOSED SYSTEM • We present a CTAC model for collaboration, and the CRMS to facilitate resource sharing amongst various tenants and their users. • We also present four different algorithms in the CTAC model, namely: activation, delegation, forward revocation and backward revocation. • Role based access control (RBAC) enables fine- grained access control (and generally in a single domain). Different extensions of RBAC have been proposed in the literature to support multi- domain access control.
  • 6. SYSTEM REQUIREMNTS • HARDWARE REQUIREMENS • System : Pentium IV 2.4 GHz. • Hard Disk : 80 GB. • Ram : 1 GB. • SOFTWARE REQURIEMENTS • Operating system : Windows 7. • Coding Language: : C# • IDE : VISUAL STUDIO • Database : MS-SQLSERVER
  • 7. CONCLUSTION • In this paper, we proposed a cross-tenant cloud resource mediation service (CRMS), which can act as a trusted-third party for fine- grained access control in a cross-tenant environment. • We also presented a formal model CTAC with four algorithms designed to handle the requests for permission activation.