Risk Based Access Control In Cloud Computing

被引:0
|
作者
Lakshmi, H. [1 ]
Namitha, S. [1 ]
Seemanthini [1 ]
Gopalan, Satheesh [1 ]
Sanjay, H. A. [1 ]
Chandrashekaran, K. [2 ]
Bhaskar, Atul [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore 64, Karnataka, India
[2] Natl Inst Technol Karnataka, Surathkal, India
关键词
Cloud security; risk based access control; insiderthreats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement.
引用
收藏
页码:1502 / 1505
页数:4
相关论文
共 50 条
  • [21] Quality Based Solution for Adaptable and Scalable Access Control in Cloud Computing
    Harika, A. Varalakshmi
    Haleema, P. K.
    Subalakshmi, R. Jaya
    Iyengar, N. Ch. S. N.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 137 - 148
  • [22] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [23] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    [J]. IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [24] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [25] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [26] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    [J]. The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [27] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [28] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [29] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80
  • [30] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    [J]. ICIC Express Letters, 2014, 8 (08): : 2163 - 2168