Risk Based Access Control In Cloud Computing

被引:0
|
作者
Lakshmi, H. [1 ]
Namitha, S. [1 ]
Seemanthini [1 ]
Gopalan, Satheesh [1 ]
Sanjay, H. A. [1 ]
Chandrashekaran, K. [2 ]
Bhaskar, Atul [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore 64, Karnataka, India
[2] Natl Inst Technol Karnataka, Surathkal, India
关键词
Cloud security; risk based access control; insiderthreats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement.
引用
收藏
页码:1502 / 1505
页数:4
相关论文
共 50 条
  • [41] An Access Control Method of Cloud Computing Resources Based on Quantified-Role
    Wu, Chunlei
    Li, Zhongwei
    Cui, Xuerong
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 919 - 923
  • [42] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    [J]. 2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [43] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    [J]. 2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [44] Research on Access Control Based on CP-ABE Algorithm and Cloud Computing
    Zhang Shaomin
    Ran Jun
    Wang Baoyi
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2273 - 2276
  • [45] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [46] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [47] Location and Time Based Access Security Control Scheme for Mobile Cloud Computing
    Merdassi, Imen
    Ghazel, Cherif
    Saidane, Leila
    [J]. 2023 12TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN, 2023,
  • [48] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    [J]. China Communications, 2016, 13 (07) : 92 - 99
  • [49] New secure access control model for cloud computing based on Chaotic systems
    BenMbarak, Omessead
    Naanaa, Anis
    ElAsmi, Sadok
    [J]. 2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1485 - 1490
  • [50] Trust Based Access Control Policy in Multi-domain of Cloud Computing
    Lin, Guoyuan
    Bie, Yuyu
    Lei, Min
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (05) : 1357 - 1365