Exploring Access
Control Mechanisms
Which Fits Best in the Cloud?
1. Mandatory Access Control (MAC)
Principle: Access rights are enforced by a central authority
based on regulations and policies.
Components: Security Server, Data Server, Client
Process:
Usage: Typically used in highly secure environments like
government and military systems.
The client requests access.
The Security Server checks access rights according to
predefined rules.
The Security Server grants or denies access based on
these rules.
2. Discretionary Access Control (DAC)
Principle: The owner of the resource (Data Owner) controls the
access permissions.
Components: Data Owner, Data Server, User
Process:
Usage: Common in systems where data owners need flexibility
in managing access rights, such as in corporate environments.
The User requests access.
The Data Owner checks access rights.
Access is granted or denied based on the owner’s
discretion.
3. Role-Based Access Control (RBAC)
Principle: Access is granted based on the roles assigned to
users within an organization.
Components: User, Service Application, Roles
Process:
Usage: Widely used in business environments where users
need access to certain resources based on their job function.
The User makes an access request.
The Service Application checks the user's roles and
corresponding permissions.
Access is granted or denied based on the roles assigned.
4. Attribute-Based Access Control (ABAC)
Principle: Access is granted based on attributes (e.g., user
attributes, resource attributes, environment attributes).
Components: User, Policy Enforcement Point, Policy Decision
Point, Service Application, Attribute Server
Process:
Usage: Ideal for dynamic environments where access decisions
need to consider multiple factors, such as cloud environments.
The User requests access.
The Policy Enforcement Point evaluates the request.
The Policy Decision Point makes the access decision based
on policies and attributes provided by the Attribute Server.
Access is granted or denied based on a combination of these
attributes.
Exploring Access Control Mechanism Which fits best in the cloud

Exploring Access Control Mechanism Which fits best in the cloud

  • 1.
  • 2.
    1. Mandatory AccessControl (MAC) Principle: Access rights are enforced by a central authority based on regulations and policies. Components: Security Server, Data Server, Client Process: Usage: Typically used in highly secure environments like government and military systems. The client requests access. The Security Server checks access rights according to predefined rules. The Security Server grants or denies access based on these rules.
  • 3.
    2. Discretionary AccessControl (DAC) Principle: The owner of the resource (Data Owner) controls the access permissions. Components: Data Owner, Data Server, User Process: Usage: Common in systems where data owners need flexibility in managing access rights, such as in corporate environments. The User requests access. The Data Owner checks access rights. Access is granted or denied based on the owner’s discretion.
  • 4.
    3. Role-Based AccessControl (RBAC) Principle: Access is granted based on the roles assigned to users within an organization. Components: User, Service Application, Roles Process: Usage: Widely used in business environments where users need access to certain resources based on their job function. The User makes an access request. The Service Application checks the user's roles and corresponding permissions. Access is granted or denied based on the roles assigned.
  • 5.
    4. Attribute-Based AccessControl (ABAC) Principle: Access is granted based on attributes (e.g., user attributes, resource attributes, environment attributes). Components: User, Policy Enforcement Point, Policy Decision Point, Service Application, Attribute Server Process: Usage: Ideal for dynamic environments where access decisions need to consider multiple factors, such as cloud environments. The User requests access. The Policy Enforcement Point evaluates the request. The Policy Decision Point makes the access decision based on policies and attributes provided by the Attribute Server. Access is granted or denied based on a combination of these attributes.