PCM in cloud - Archive ouverte HAL Access content directly
Conference Papers Year : 2014

PCM in cloud


Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service. Published in:

Not file

Dates and versions

hal-02288436 , version 1 (14-09-2019)


  • HAL Id : hal-02288436 , version 1


Mounira Msahli, Ahmed Serhrouchni. PCM in cloud. IEEE International Conference on Granular Computing (GrC), Oct 2014, Noboribetsu, Japan. ⟨hal-02288436⟩
26 View
0 Download


Gmail Facebook Twitter LinkedIn More