{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:13:57Z","timestamp":1771539237816,"version":"3.50.1"},"reference-count":13,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.<\/p>","DOI":"10.4018\/ijcac.2013100103","type":"journal-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T12:06:52Z","timestamp":1397563612000},"page":"28-37","source":"Crossref","is-referenced-by-count":11,"title":["Securing Data Storage By Extending Role-Based Access Control"],"prefix":"10.4018","volume":"3","author":[{"given":"Mamoon","family":"Rashid","sequence":"first","affiliation":[{"name":"Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India"}]},{"given":"Er. Rishma","family":"Chawla","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India"}]}],"member":"2432","reference":[{"key":"ijcac.2013100103-0","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"ijcac.2013100103-1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"ijcac.2013100103-2","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., & Ray, I. (2006). TrustBAC: Integrating trust relationships into the RBAC model for access control in open systems. In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, CA.","DOI":"10.1145\/1133058.1133067"},{"key":"ijcac.2013100103-3","unstructured":"Cloud Security Alliance (CSA). (2009). Security guidance for critical areas of focus in cloud computing V2.1. Retrieved from http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.v2.1.pdf"},{"key":"ijcac.2013100103-4","unstructured":"Devdatta, K., & Anand, T. (2008). Context-aware role-based access control in pervasive computing systems. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO."},{"key":"ijcac.2013100103-5","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Proceedings of the Grid Computing Environments Workshop (GCE\u201908) (pp. 1-10).","DOI":"10.1109\/GCE.2008.4738445"},{"key":"ijcac.2013100103-6","unstructured":"Microsoft Azure Documentation support. (n.d.). Retrieved from http:\/\/www.windowsazure.com\/enus\/develop\/net\/how-to-guides\/blob-storage\/"},{"key":"ijcac.2013100103-7","doi-asserted-by":"crossref","unstructured":"Ray, I., Kumar, M., & Yu, L. (2006). LRBAC: A location-aware role-based access control model. In Proceedings of the 2nd International Conference on Information Systems Security, Kolkata, India.","DOI":"10.1007\/11961635_10"},{"key":"ijcac.2013100103-8","doi-asserted-by":"crossref","unstructured":"Ray, I., & Toahchoodee, M. (2007). A spatio temporal role based access control model. In Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA.","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"ijcac.2013100103-9","doi-asserted-by":"crossref","unstructured":"Sandhu, R. (1996). Role hierarchies and constraints for latice-based access controls. In E. Bertino, H. Kurth, G. Martella, & E Monotolivo (Eds.), Proceedings of the European Symposium on Research in Computer Security 1996 (LNCS 1146), Rome, Italy.","DOI":"10.1007\/3-540-61770-1_28"},{"key":"ijcac.2013100103-10","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ijcac.2013100103-11","doi-asserted-by":"crossref","unstructured":"Shen, H., & Hong, F. (2005). A context-aware role-based access control model for web services. In Proceedings of the IEEE International Conference on e-Business Engineering, Beijing, China.","DOI":"10.1109\/ICEBE.2005.1"},{"key":"ijcac.2013100103-12","unstructured":"Xinwen, Z., Sejong, O., & Ravi, S. (2003). PBDM: A exible delegation model in RBAC. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, Como, Italy."}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:07:34Z","timestamp":1654114054000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2013100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2013100103","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}