Intelligent Temporal Role Based Access Control for Data Storage in Cloud Database

被引:0
|
作者
Muthurajkumar, S. [1 ]
Vijayalakshmi, M. [1 ]
Kannan, A. [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, Coll Engn Guindy, Madras 600025, Tamil Nadu, India
关键词
Role Based Access; Cloud Security; Cloud Database; ITRBAC; Cloud Computing; Rule Base Manager;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Recently cloud computing has become a fast growing area and helps to store very huge volume of data. In such a scenario, the computing resources including processor and memory are offered flexibly to the users as services on the internet. The users can get access to any of the resources available on the cloud based on their demand and they have to make payments for such services. In order to provide these features, access control techniques are essential since they satisfy the security requirements for handling the required payments effectively. In this paper, a new security mechanism for cloud computing with a focus on access control is proposed. In the past, different access control techniques including the traditional role-based access control (RBAC) model were used to implement the security features in databases. In this work, the traditional RBAC is modified to suit the security cloud requirements of databases by providing temporal extensions and intelligent agents. From the experiments carried out in this work, it has been observed that the proposed Intelligent Temporal RBAC is well suited to secure the cloud databases effectively. In this model, users or applications are clearly separated according to their job functions for database access with respect to the variation in time and situation.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [31] Secure Data Access Control for multi-authority Quantum based Cloud Storage
    Vidya, K.
    Abinaya, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 387 - 391
  • [32] Auditable attribute-based data access control using blockchain in cloud storage
    Arasi, V. Ezhil
    Gandhi, K. Indra
    Kulothungan, K.
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10772 - 10798
  • [33] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [34] A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
    Li, Xinlong
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [35] Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
    Jian Xu
    Yanbo Yu
    Qingyu Meng
    Qiyu Wu
    Fucai Zhou
    Mobile Networks and Applications, 2021, 26 : 1475 - 1492
  • [36] Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
    Xu, Jian
    Yu, Yanbo
    Meng, Qingyu
    Wu, Qiyu
    Zhou, Fucai
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1475 - 1492
  • [37] Limited Times of Data Access Based on SGX in Cloud Storage
    Ren, Zhengwei
    Chen, Xiaoshuang
    Tang, Jinshan
    Wang, Lina
    Tong, Yan
    Xu, Shiwei
    2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 3146 - 3151
  • [38] Novel Data Storage and Retrieval in Cloud Database by using Frequent Access Node Encryption
    Syed, Sadia
    Teja, P. Srinivas
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 353 - 356
  • [39] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [40] Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control
    Zhou Yousheng
    Chen Lujun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (07) : 1856 - 1863