Risk Based Access Control In Cloud Computing

被引:0
|
作者
Lakshmi, H. [1 ]
Namitha, S. [1 ]
Seemanthini [1 ]
Gopalan, Satheesh [1 ]
Sanjay, H. A. [1 ]
Chandrashekaran, K. [2 ]
Bhaskar, Atul [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore 64, Karnataka, India
[2] Natl Inst Technol Karnataka, Surathkal, India
关键词
Cloud security; risk based access control; insiderthreats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement.
引用
收藏
页码:1502 / 1505
页数:4
相关论文
共 50 条
  • [1] A Dynamic Risk-based Access Control Architecture for Cloud Computing
    dos Santos, Daniel Ricardo
    Westphall, Carla Merkle
    Westphall, Carlos Becker
    [J]. 2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [2] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [3] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [4] Towards Secure Risk-Adaptable Access Control in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 324 - 330
  • [5] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [6] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [7] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [8] Access control based resource allocation in cloud computing environment
    [J]. Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19):
  • [9] Research on cloud computing service based on trust access control
    Sun, Panjun
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12
  • [10] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203