Skip to main content
  • Textbook
  • © 2020

Access Control Management in Cloud Environments

  • Benefits researchers through insight into new ideas based on access control and Blockchain techniques

  • Explains how role based access control methods can be applied

  • Covers the management of relationships between users, roles, and permissions

  • Helps those who work on online business technology, cloud computing and Blocktrain technology, access control management, role-based access control, usage-based access control, anonymity, privacy preserving algorithms and secure information sharing

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 chapters)

  1. Front Matter

    Pages i-xvii
  2. Part I

    1. Front Matter

      Pages 1-1
    2. Introduction

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 3-24
    3. Electronic Commerce Items and Related Technology

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 25-42
    4. Untraceable Electronic Cash System in the Internet of Things

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 43-63
  3. Part II

    1. Front Matter

      Pages 65-65
    2. Achieving Secure and Flexible M-Services Through Tickets

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 67-89
    3. A Self-Scalable Anonymity Payment Approach in Cloud Environment

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 91-115
    4. Using RBAC to Secure Payment Process in Cloud

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 117-138
  4. Part III

    1. Front Matter

      Pages 117-117
    2. Role-Based Access Control Constraints and Object Constraint Language

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 141-158
    3. Role-Based Delegation with Negative Authorization

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 159-175
  5. Part IV

    1. Front Matter

      Pages 155-155
    2. Access Control Management for Ubiquitous Computing

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 179-201
    3. Trust-Based Access Control Management in Collaborative Open Social Networks

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 203-221
  6. Part V

    1. Front Matter

      Pages 201-201
    2. Effective Collaboration with Information Sharing in Virtual Universities

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 249-281
    3. Distributed Access Control Through Blockchain Technology

      • Hua Wang, Jinli Cao, Yanchun Zhang
      Pages 283-297
  7. Back Matter

    Pages 299-300

About this book

This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities in the cloud. Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. Thus this will be a useful book for universities to purchase. 

This textbook provides new direction for access control management and online business, with new challenges within Blockchain technology that may arise in cloud environments. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. Experts will get benefits from these challenges through the developed methodology for authorization granting algorithm, and weak revocation and strong revocation algorithms.


Authors and Affiliations

  • Victoria University, Melbourne, Australia

    Hua Wang, Yanchun Zhang

  • Comp Sci & Comp Eng, La Trobe University, Bundoora, Australia

    Jinli Cao

About the authors

Hua Wang


Hua is now a full time Professor in ISILC at Victoria University.  Hua has more than ten years teaching and working experience in Applied Informatics at both enterprise and university. He has expertise in Big Data, Health Informatics, Cloud Computing, Cyber Security, and Artificial Intelligence. As a Chief Investigator, Hua has successfully received six in total Australian Research Council (ARC) grants including four  Discovery grants and two Linkage grants with 2.3M since 2006. He is also a successor for international grants such as  two Japan – Australian grants, one German – Australian grant, one Norway Government grant and grants from Hong Kong Chinese University, Hong Kong City University.

 

Hua has published 232 refereed scholar papers including 46 Q1 (ERA2015 ranked) Journal papers in cyber security, Artificial Intelligence, data mining, database, privacy preserving and Web services. Representative publications are on ACM Transactions on Internet Technology, ACM Transactions on Information Systems, ACM Transactions on Knowledge Discovery from Data, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Automation Science and Engineering and World Wide Web; and Proceedings of ACL, AAAI, CIKM, ICDE, ICDM and PAKDD (https://scholar.google.com.au/citations?user=U7B_FmYAAAAJ&hl=en). Hua’s h-index is 34 based on Google Scholar website. As a principal supervisor, he currently has 14 PhD students at VU and has successfully supervised 7 PhD students.

 

Yanchun Zhang

 

Yanchun Zhang is a Professor of Computer Science at Victoria University, Australia. Dr. Zhang obtained a PhD degree in Computer Science from The University of Queensland in 1991. His research interests include databases, data mining, web services and e-health. He has published over 300 research papers in international journals and conference proceedings including ACM Transactions on Computer and Human Interaction (TOCHI), IEEE Transactions on Knowledge and Data Engineering (TKDE), VLDBJ, SIGMOD and ICDE conferences, and a dozen of books and journal special issues in the related areas.  Dr. Zhang is a founding editor and editor-in-chief of World Wide Web Journal (Springer) and Health Information Science and Systems Journal (Springer), and also the founding editor of Web Information Systems Engineering Book Series and Health Information Science Book Series. He is Chairman of International Web information Systems Engineering Society (WISE).

 

His research has been supported by various competitive funding, including 7 prestigious ARC Discovery and ARC Linkage Projects. In addition to high quality research output/publications (in Pattern Recognition, IEEE TKDE, Information Systems, JCSS, etc), Prof Zhang has made strong impact through his leadership in applied research and collaborations with government and industry organizations such as World Health Organization and Tasmanian Department of Health and Human Services, Australian e-Health Research Centre. Their multidisciplinary research into e-health in collaboration with World Health Organization and Tasmanian Department of Health and Human Services have produced software systems and mapping tools to help the government/industry organizations establish health needs, allowing it to base policy on firm evidence. Representative work on gait classification in children with cerebral palsy is published in Pattern Recognition (2009, ERA A*). Recent collaborations with World Health Organisation (WHO) and Tasmania Department of Health and Human Services (DHHS) have produced several software systems adopted by WHO and Tasmania DHHS.

 

Jinli Cao

Dr. Cao has been a full-time senior lecturer at department of computer science and Information technology, La Trobe University, Australia. Dr Cao is an active researcher in the evolutionary fields of computer science, data engineering and information systems. such as Data security, privacy protection, Data quality, Big data analytics, Cloud computing, Recommendation Systems, Query Mining, Reliable queries in uncertain databases, Top-k query ranking and Decision supporting systems.  She has successfully supervised 9 PhD graduates who have been employed by universities in Australian and overseas. Many of her Honours and Master graduates have been employed by top industries such as Oracle, Unisys, Computer Sciences Corporation, National Australia Bank and Commonwealth bank, etc.   

 

Dr. Cao has published over 107 research papers in international journals and conferences such as IEEE Trans. on Distributed and Parallel Processing, IEEE Trans. on Knowledge and Data Engineering, Information Sciences, Journal of Computer and System Sciences, and the top conferences such as WWW, WISE, CAiSE , DASFAA, GECCO, IJCNN etc.  Dr Cao has been serving continually for professional research communities. She has been contributing many related professional research communities. She has been nominated as the 'expert of international standing' for accessing Australian Research Council (ARC) Grant since 2006 to the present.  She has served a number of International journals, and international conferences as the reviewer and the PC member. Dr Cao was a Guest Editor for Special Issue on: "Multimedia Data Applications in Wireless sensor networks" of International Journal of Sensor Networks in 2011.

Bibliographic Information

  • Book Title: Access Control Management in Cloud Environments

  • Authors: Hua Wang, Jinli Cao, Yanchun Zhang

  • DOI: https://doi.org/10.1007/978-3-030-31729-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2020

  • Hardcover ISBN: 978-3-030-31728-7Published: 30 September 2020

  • Softcover ISBN: 978-3-030-31731-7Published: 01 October 2021

  • eBook ISBN: 978-3-030-31729-4Published: 29 September 2020

  • Edition Number: 1

  • Number of Pages: XVII, 300

  • Number of Illustrations: 61 b/w illustrations

  • Topics: Systems and Data Security, Information Storage and Retrieval

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access