Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing

被引:1
|
作者
Kaur, Amardeep [1 ]
Verma, Amandeep [1 ]
机构
[1] Punjabi Univ, Patiala, India
关键词
CONTROL FRAMEWORK; ENVIRONMENT;
D O I
10.1155/2023/3922393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user's role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resource utilization. However, this optimization is challenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufficient knowledge, some resources may be available to the wrong roles, while others may be required by other roles but are inaccessible. This results in decreased resource utilization, requiring the redefinition of access control policies with optimal resource availability. The optimal allocation of resources can be achieved by analyzing user behaviour under different roles. The study proposes a novel method for access control that utilizes role profiling and redefines access control policies for different roles to optimize resource availability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifications provide a high-level representation of system behaviour and characteristics. This paper proposes formal specifications using the "Z" language to ensure accurate system behaviour in access control mechanisms. The proposed mechanism is implemented in a simulated environment and validated using four variants of the recommender approach. The study concludes that the proposed mechanism consistently enhances operational capability, minimizing over- and under-allocation of resources to roles and improving overall resource utilization within the enterprise. The proposed method is beneficial in dynamic environments where the system must adapt to evolving scenarios.
引用
收藏
页数:30
相关论文
共 50 条
  • [21] Access Control Aware Search on the Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Challal, Zakia
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1258 - 1264
  • [22] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [23] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [24] A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
    Lin, Hui
    Xu, Li
    Huang, Xinyi
    Wu, Wei
    Huang, Yijie
    AD HOC NETWORKS, 2015, 35 : 51 - 64
  • [25] ACCESS CONTROL MECHANISM FOR COMPUTING RESOURCES
    GLADNEY, HM
    WORLEY, EL
    MYERS, JJ
    IBM SYSTEMS JOURNAL, 1975, 14 (03) : 212 - 228
  • [26] A Virtual Enterprise Oriented Access Control Mechanism
    Gu, Chunhua
    Zhang, Xueqin
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 55 - +
  • [27] Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
    J. V. Bibal Benifa
    G. Venifa Mini
    Service Oriented Computing and Applications, 2021, 15 : 187 - 203
  • [28] Fast Access Security on Cloud Computing: Ubuntu Enterprise Server and Cloud with Face and Fingerprint Identification
    Chang, Bao Rong
    Tsai, Hsiu Fen
    Huang, Chien-Feng
    Lin, Zih-Yao
    Chen, Chi-Ming
    PROCEEDINGS OF THE 2011 2ND INTERNATIONAL CONGRESS ON COMPUTER APPLICATIONS AND COMPUTATIONAL SCIENCE, VOL 1, 2012, 144 : 451 - +
  • [29] Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
    Benifa, J. V. Bibal
    Mini, G. Venifa
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 187 - 203
  • [30] Economics of cloud computing for enterprise IT
    Beaty, K. A.
    Naik, V. K.
    Perng, C. -S.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2011, 55 (06)