Risk Based Access Control In Cloud Computing

被引:0
|
作者
Lakshmi, H. [1 ]
Namitha, S. [1 ]
Seemanthini [1 ]
Gopalan, Satheesh [1 ]
Sanjay, H. A. [1 ]
Chandrashekaran, K. [2 ]
Bhaskar, Atul [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore 64, Karnataka, India
[2] Natl Inst Technol Karnataka, Surathkal, India
关键词
Cloud security; risk based access control; insiderthreats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement.
引用
收藏
页码:1502 / 1505
页数:4
相关论文
共 50 条
  • [31] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [32] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80
  • [33] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [34] Enhancing Access Control Trees for Cloud Computing
    Ayeb, Neil
    Di Cerbo, Francesco
    Trabelsi, Slim
    CURRENT TRENDS IN WEB ENGINEERING, ICWE 2016 INTERNATIONAL WORKSHOPS, 2016, 9881 : 29 - 38
  • [35] Verifiable computation with access control in cloud computing
    Xu, Lingling
    Tang, Shaohua
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (02): : 528 - 546
  • [36] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [37] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
  • [38] Access Control Models for Cloud Computing: A Review
    Shan, Ting Li
    Ismail, Saiful Adli
    Azizan, Azizul
    2018 2ND INTERNATIONAL CONFERENCE ON TELEMATICS AND FUTURE GENERATION NETWORKS (TAFGEN), 2018, : 155 - 158
  • [39] A survey on access control mechanisms for cloud computing
    El Sibai, Rayane
    Gemayel, Nader
    Abdo, Jacques Bou
    Demerjian, Jacques
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [40] Access Control Aware Search on the Cloud Computing
    Kaci, Abdellah
    Bouabana-Tebibel, Thouraya
    Challal, Zakia
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1258 - 1264