Risk Based Access Control In Cloud Computing

被引:0
|
作者
Lakshmi, H. [1 ]
Namitha, S. [1 ]
Seemanthini [1 ]
Gopalan, Satheesh [1 ]
Sanjay, H. A. [1 ]
Chandrashekaran, K. [2 ]
Bhaskar, Atul [1 ]
机构
[1] Nitte Meenakshi Inst Technol, Dept Informat Sci & Engn, Bangalore 64, Karnataka, India
[2] Natl Inst Technol Karnataka, Surathkal, India
关键词
Cloud security; risk based access control; insiderthreats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement.
引用
收藏
页码:1502 / 1505
页数:4
相关论文
共 50 条
  • [41] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [42] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [43] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [44] Research on Data Protection Based on Encrypted Attribute Access Control in Cloud Computing
    Zhang, Hua
    Lou, Fang
    Wang, Hao
    Tian, Zhihong
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 450 - 453
  • [45] Research on Access Control Based on CP-ABE Algorithm and Cloud Computing
    Zhang Shaomin
    Ran Jun
    Wang Baoyi
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2273 - 2276
  • [46] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [47] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [48] An Access Control Method of Cloud Computing Resources Based on Quantified-Role
    Wu, Chunlei
    Li, Zhongwei
    Cui, Xuerong
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 919 - 923
  • [49] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [50] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175