Fuzzy User Access Trust Model for Cloud Access Control

被引:2
|
作者
Khan, Aakib Jawed [1 ]
Mehfuz, Shabana [1 ]
机构
[1] Jamia Millia Islamia, Dept Elect Engn, New Delhi 110025, India
来源
关键词
Cloud architecture; fuzzy logic; trust-based access mechanism; SECURITY ISSUES;
D O I
10.32604/csse.2023.023378
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs and service providers face a huge challenge to ensure the security and integrity of both network and data. To overcome these challenges access control mechanisms are employed. Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data. For ensuring data integrity on cloud platforms, access control mechanisms should go beyond authentication, identification, and authorization. Thus, in this work, a trust-based access control mechanism is proposed that analyzes the data of the user behavior, network behavior, demand behavior, and security behavior for computing trust value before granting user access. The method that computes the final trust value makes use of the fuzzy logic algorithm. The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.
引用
收藏
页码:113 / 128
页数:16
相关论文
共 50 条
  • [1] Dynamic User Access Control Model of Private Cloud
    He, Xue-Qian
    Ling, Jie
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 761 - 766
  • [2] Secure Access Control Model for Cloud Computing Environment with Fuzzy Max Interval Trust Values
    Khan, Aakib Jawed
    Mehfuz, Shabana
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 536 - 542
  • [3] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [4] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [5] Trust-Based Fuzzy Access Control Model Research
    Su, Rina
    Zhang, Yongping
    He, Zhongkun
    Fan, Shaojing
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 393 - 399
  • [6] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242
  • [7] A Trust-Game-Based Access Control Model for Cloud Service
    Pan Jun, Sun
    [J]. MOBILE INFORMATION SYSTEMS, 2020, 2020 (2020)
  • [8] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    [J]. CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [9] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [10] Development of trust based access control models using fuzzy logic in cloud computing
    Kesarwani, Abhishek
    Khilar, Pabitra Mohan
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (05) : 1958 - 1967