Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing

被引:1
|
作者
Kaur, Amardeep [1 ]
Verma, Amandeep [1 ]
机构
[1] Punjabi Univ, Patiala, India
关键词
CONTROL FRAMEWORK; ENVIRONMENT;
D O I
10.1155/2023/3922393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user's role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resource utilization. However, this optimization is challenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufficient knowledge, some resources may be available to the wrong roles, while others may be required by other roles but are inaccessible. This results in decreased resource utilization, requiring the redefinition of access control policies with optimal resource availability. The optimal allocation of resources can be achieved by analyzing user behaviour under different roles. The study proposes a novel method for access control that utilizes role profiling and redefines access control policies for different roles to optimize resource availability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifications provide a high-level representation of system behaviour and characteristics. This paper proposes formal specifications using the "Z" language to ensure accurate system behaviour in access control mechanisms. The proposed mechanism is implemented in a simulated environment and validated using four variants of the recommender approach. The study concludes that the proposed mechanism consistently enhances operational capability, minimizing over- and under-allocation of resources to roles and improving overall resource utilization within the enterprise. The proposed method is beneficial in dynamic environments where the system must adapt to evolving scenarios.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] A Lightweight Access Control Mechanism for Mobile Cloud Computing
    Yao, Xuanxia
    Han, Xiaoguang
    Du, Xiaojiang
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 380 - 385
  • [2] Self-Adaptive Access Control & Delegation in Cloud Computing
    Malik, Ali Ahmad
    Anwar, Hirra
    Shibli, Muhammad Awais
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 169 - 176
  • [3] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [4] CLOUD COMPUTING AND THE ENTERPRISE
    Arumugam, Mahesh
    2012 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2012,
  • [5] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [6] A Distributed Access Control Architecture for Cloud Computing
    Almutairi, Abdulrahman A.
    Sarfraz, Muhammad I.
    Basalamah, Saleh
    Aref, Walid G.
    Ghafoor, Arif
    IEEE SOFTWARE, 2012, 29 (02) : 36 - 44
  • [7] Towards Temporal Access Control in Cloud Computing
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Huang, Dijiang
    Wang, Shanbiao
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2576 - 2580
  • [8] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [9] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [10] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231