Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing

被引:1
|
作者
Kaur, Amardeep [1 ]
Verma, Amandeep [1 ]
机构
[1] Punjabi Univ, Patiala, India
关键词
CONTROL FRAMEWORK; ENVIRONMENT;
D O I
10.1155/2023/3922393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user's role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resource utilization. However, this optimization is challenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufficient knowledge, some resources may be available to the wrong roles, while others may be required by other roles but are inaccessible. This results in decreased resource utilization, requiring the redefinition of access control policies with optimal resource availability. The optimal allocation of resources can be achieved by analyzing user behaviour under different roles. The study proposes a novel method for access control that utilizes role profiling and redefines access control policies for different roles to optimize resource availability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifications provide a high-level representation of system behaviour and characteristics. This paper proposes formal specifications using the "Z" language to ensure accurate system behaviour in access control mechanisms. The proposed mechanism is implemented in a simulated environment and validated using four variants of the recommender approach. The study concludes that the proposed mechanism consistently enhances operational capability, minimizing over- and under-allocation of resources to roles and improving overall resource utilization within the enterprise. The proposed method is beneficial in dynamic environments where the system must adapt to evolving scenarios.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] Access control requirements for structured document in cloud computing
    Yao, Zhiqiang
    Xiong, Jinbo
    Ma, Jianfeng
    Li, Qi
    Liu, Ximeng
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 95 - 102
  • [42] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [43] Critical Comparison of Access Control Models for Cloud Computing
    Beraka, Mutaz
    Al-Muhtadi, Jalal
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 431 - 442
  • [44] Survey of access control models and technologies for cloud computing
    Fangbo Cai
    Nafei Zhu
    Jingsha He
    Pengyu Mu
    Wenxin Li
    Yi Yu
    Cluster Computing, 2019, 22 : 6111 - 6122
  • [45] A credible usage access control model in cloud computing
    Wang, Fengying
    Li, Caihong
    Zhao, Hui
    Liu, Shushu
    Information Technology Journal, 2013, 12 (20) : 5553 - 5558
  • [46] Research on Access Control Techniques in SaaS of Cloud Computing
    Rehman, Shabana
    Gautam, Rahul
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 92 - 100
  • [47] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [48] Towards an Approach of Semantic Access Control for Cloud Computing
    Hu, Luokai
    Ying, Shi
    Jia, Xiangyang
    Zhao, Kai
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 145 - 156
  • [49] A Classified Access Control Model Research for Cloud Computing
    Shen, Wenyi
    Tao, Linbo
    Liu, Bo
    Wang, Yishen
    PROCEEDINGS OF 2017 CHINESE INTELLIGENT AUTOMATION CONFERENCE, 2018, 458 : 327 - 334
  • [50] Access control for Hadoop-based cloud computing
    Wang, Zhihua
    Pang, Haibo
    Li, Zhanbo
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59