Towards Secure Risk-Adaptable Access Control in Cloud Computing

被引:0
|
作者
Abdullah, Salasiah [1 ]
Abu Bakar, Khairul Azmi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
关键词
Security; privacy; cloud computing; risk-adaptable access control; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.
引用
收藏
页码:324 / 330
页数:7
相关论文
共 50 条
  • [1] SoTRAACE - Socio-Technical Risk-Adaptable Access Control Model
    Moura, Pedro
    Fazendeiro, Paulo
    Marques, Pedro
    Ferreira, Ana
    [J]. 2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [2] Situational Awareness based Risk-adaptable Access Control in Enterprise Networks
    Lee, Brian
    Vanickis, Roman
    Rogelio, Franklin
    Jacob, Paul
    [J]. IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 400 - 405
  • [3] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    Tu Shanshan
    Huang Yongfeng
    [J]. CHINA COMMUNICATIONS, 2015, 12 (12) : 43 - 52
  • [4] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    TU Shanshan
    HUANG Yongfeng
    [J]. China Communications, 2015, 12 (12) : 43 - 52
  • [5] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wei Wu
    Shun Hu
    Xu Yang
    Joseph K. Liu
    Man Ho Au
    [J]. Soft Computing, 2017, 21 : 2643 - 2649
  • [6] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wu, Wei
    Hu, Shun
    Yang, Xu
    Liu, Joseph K.
    Au, Man Ho
    [J]. SOFT COMPUTING, 2017, 21 (10) : 2643 - 2649
  • [7] Towards a Secure Access to Patient Data in Cloud Computing Environments
    Aminzou, Said
    Er-Raha, Brahim
    Khamlichi, Youness Idrissi
    Afdel, Karim
    Machkour, Mustapha
    [J]. 2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [8] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [9] Quality Based Solution for Adaptable and Scalable Access Control in Cloud Computing
    Harika, A. Varalakshmi
    Haleema, P. K.
    Subalakshmi, R. Jaya
    Iyengar, N. Ch. S. N.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 137 - 148
  • [10] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020