What is it about?
This paper discusses a way to make managing data security easier for users. Nowadays, people can access their data through various methods like direct connections, shared filesystems, or web-based drives. This variety leads to complex rules about who can access what data. Users also have a lot of freedom in creating and using storage resources from different Cloud providers, either locally or remotely. These providers often make it seem like there are limitless resources available, hiding the actual data locations. As resources are distributed more widely, access control methods have evolved. Simple identity-based access control (IBAC) used to be enough, but now more complex methods like role-based (RBAC) and attribute-based access control (ABAC) are needed. This paper focuses on ABAC because it not only controls access based on attributes but also provides information about a user’s profile. This profile information can help simplify the setup and management of data services across distributed resources like those provided by Cloud services.
Featured Image
Photo by Stebilex Systems on Unsplash
Why is it important?
This topic is important for several reasons: -> User-Friendly Security Management: Simplifying data security management makes it easier for users to understand and control who can access their data, enhancing their ability to protect sensitive information. -> Adaptation to Modern Access Methods: As users access data through various means (direct connections, shared filesystems, web drives), traditional access control methods are no longer sufficient. Adapting to these modern methods ensures consistent and effective security across all access points. -> Efficient Use of Cloud Resources: With the growing use of Cloud services, users often don't know where their data is physically stored. Simplifying security management helps users take full advantage of Cloud resources without compromising security. -> Scalability: Attribute-based access control (ABAC) allows for more granular and flexible security policies that can scale with the increasing complexity of user roles and data access needs. -> Profile-Based Customization: By using attributes, security policies can be tailored to individual user profiles, providing a more personalized and secure user experience. -> Enhanced Security: Complex and distributed environments require advanced security measures. ABAC can provide a more robust security framework, reducing the risk of unauthorized access and data breaches.
Perspectives
Read the Original
This page is a summary of: Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes, January 2024, Springer Science + Business Media,
DOI: 10.1007/978-3-031-59933-0_14.
You can read the full text:
Resources
Contributors
The following have contributed to this page