Fuzzy User Access Trust Model for Cloud Access Control

被引:2
|
作者
Khan, Aakib Jawed [1 ]
Mehfuz, Shabana [1 ]
机构
[1] Jamia Millia Islamia, Dept Elect Engn, New Delhi 110025, India
来源
关键词
Cloud architecture; fuzzy logic; trust-based access mechanism; SECURITY ISSUES;
D O I
10.32604/csse.2023.023378
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs and service providers face a huge challenge to ensure the security and integrity of both network and data. To overcome these challenges access control mechanisms are employed. Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data. For ensuring data integrity on cloud platforms, access control mechanisms should go beyond authentication, identification, and authorization. Thus, in this work, a trust-based access control mechanism is proposed that analyzes the data of the user behavior, network behavior, demand behavior, and security behavior for computing trust value before granting user access. The method that computes the final trust value makes use of the fuzzy logic algorithm. The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.
引用
下载
收藏
页码:113 / 128
页数:16
相关论文
共 50 条
  • [41] Enhanced Trust Based Access Control for Multi-Cloud Environment
    Paul, N. R. Rejin
    Raj, D. Paul
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (03): : 3079 - 3093
  • [42] Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering
    Zhao, Li
    Sun, Meng
    Yang, Binbin
    Xie, Junpeng
    Feng, Jiqiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (03) : 3189 - 3201
  • [43] A trust-based dynamic access control model
    Ma, Shunan
    He, Jingsha
    Gao, Feng
    Sun, Xuguang
    Journal of Information and Computational Science, 2010, 7 (10): : 2165 - 2173
  • [44] Performance analysis of the dynamic trust model algorithm using the fuzzy inference system for access control*
    Abirami, G.
    Venkataraman, Revathi
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [45] A medical big data access control model based on fuzzy trust prediction and regression analysis
    Jiang, Rong
    Xin, Yang
    Chen, Zhenxing
    Zhang, Ying
    APPLIED SOFT COMPUTING, 2022, 117
  • [46] User Centric Access Control Policy Management Framework for Cloud Applications
    Ghafoor, Abdul
    Irum, Misbah
    Qaisar, Muhammad
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 135 - 140
  • [47] A User Access Control Scheme for Reducing Authentication Keys in Cloud Systems
    Hong, Seungtae
    Kim, Hyeongil
    Kim, Taehoon
    Chang, Jaewoo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 229 - 240
  • [48] A cloud-user access control mechanism based on data masking
    Wu, Ting-Kuang
    Lin, Yung-Wang
    Lin, Iuon-Chang
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 165 - 168
  • [49] Non-zero-sum cooperative access control game model with user trust and permission risk
    Helil, Nurmamat
    Halik, Azhar
    Rahman, Kaysar
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 307 : 299 - 310
  • [50] Fine-Grained Access Control Model for Body Sensor Networks Based on User Trust Degree
    Xu, Guangxia
    Ren, Lingling
    Song, Yangyang
    Xiao, Yunpeng
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 18 - 21