Secure data access control with perception reasoning

  • Abdul Mateen
  • Abdul Rauf
    Universiti Teknologi Malaysia
  • Abdul Hanan Abdullah
    Universiti Teknologi Malaysia
  • Mahmood Ashraf
    Federal Urdu University of Arts, Science & Technology

Abstract

In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the user's context information. In role activation process, the knowledge of reason used for data collection and usage is declared; this can allow the administrator to declare the policies which are context based. Therefore, there is dynamic activation of role permission due to the association of role with context. The complications in the role based access control model reduced by classifying the users into classes or groups having their own access control standards. Access to specific resources and granting/ denying is based on requesting the user identity. Cloud environments consist of different entities, number of resources and user where general access control model fails to cover all the aspects. Here, in the proposed access control with perception reasoning, entities are extended using Extensible Access Control Mark-up Language (XACML) where trust module monitors the random and dynamic behavior of the user with recognizing and restricting the malicious user for illegal data access. By issuing and identity tag to malicious user includes classification of task and data tag with data in the database.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Almorsy, M., J. Grundy, and I. Müller, An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107, 2016.

Barati, M., et al. A new semantic role-based access control model for cloud computing. in 9th International Conference on Internet and Web Applications and Services, Paris. 2014. Citeseer.

Bhargava, R., R. Pramoda, and D. Mudugurki, Dynamic RBAC Model for Cloud Computing. 2015.

Chang, V., Y.-H. Kuo, and M. Ramachandran, Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 2016. 57: p. 24-41. - https://doi.org/10.1016/j.future.2015.09.031

Choi, C., J. Choi, and P. Kim, Ontology-based access control model for security policy reasoning in cloud computing. The Journal of Supercomputing, 2014. 67(3): p. 711-722. - https://doi.org/10.1007/s11227-013-0980-1

Ed-Daibouni, M., et al., Toward a New Extension of the Access Control Model ABAC for Cloud Computing, in Advances in Ubiquitous Networking. 2016, Springer. p. 79-89. - https://doi.org/10.1007/978-981-287-990-5_7

Fernandes, D.A., et al., Security issues in cloud environments: a survey. International Journal of Information Security, 2014. 13(2): p. 113-170. - https://doi.org/10.1007/s10207-013-0208-7

Garg, S.K., S. Versteeg, and R. Buyya, A framework for ranking of cloud computing services. Future Generation Computer Systems, 2013. 29(4): p. 1012-1023. - https://doi.org/10.1016/j.future.2012.06.006

Ghazi, Y., et al., Usage-Based Access Control for Cloud Applications, in Innovative Solutions for Access Control Management. 2016, IGI Global. p. 197-223. - https://doi.org/10.4018/978-1-5225-0448-1.ch007

Grewal, R.K. and P.K. Pateriya, A rule-based approach for effective resource provisioning in hybrid cloud environment, in New Paradigms in Internet Computing. 2013, Springer. p. 41-57. - https://doi.org/10.1007/978-3-642-35461-8_5

Kalloniatis, C., H. Mouratidis, and S. Islam, Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 2013. 18(4): p. 299-319. - https://doi.org/10.1007/s00766-013-0166-7

Kaur, P.D. and I. Chana, Cloud based intelligent system for delivering health care as a service. Computer methods and programs in biomedicine, 2014. 113(1): p. 346-359. - https://doi.org/10.1016/j.cmpb.2013.09.013

Li, H., et al. A survey of extended role-based access control in cloud computing. in Proceedings of the 4th International Conference on Computer Engineering and Networks. 2015. Springer. - https://doi.org/10.1007/978-3-319-11104-9_95

Lin, C.-Y., C.-H. Fu, and Y.-L. Yeh, A Lightweight Fine-grained Sensitive Data Access Control Model in a Cloud Computing Environment. ??????, 2016. 37(1): p. 1-14.

Lin, G., et al., MTBAC: a mutual trust based access control model in cloud computing. China Communications, 2014. 11(4): p. 154-162. - https://doi.org/10.1109/CC.2014.6827577

Liu, C.-L., Cloud service access control system based on ontologies. Advances in Engineering Software, 2014. 69: p. 26-36. - https://doi.org/10.1016/j.advengsoft.2013.12.006

Liu, J.K., et al., Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 2016. 11(3): p. 484-497. - https://doi.org/10.1109/TIFS.2015.2493983

Lo, N.W., T.C. Yang, and M.H. Guo, An attribute-role based access control mechanism for multi-tenancy cloud environment. Wireless Personal Communications, 2015. 84(3): p. 2119-2134. - https://doi.org/10.1007/s11277-015-2515-y

Madani, M.A., M. Erradi, and Y. Benkaouz, A Collaborative Task Role Based Access Control Model. Journal of Information Assurance & Security, 2016. 11(6).

Manuel, P., A trust model of cloud computing based on Quality of Service. Annals of Operations Research, 2015. 233(1): p. 281-292. - https://doi.org/10.1007/s10479-013-1380-x

Modi, C., et al., A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 2013. 63(2): p. 561-592. - https://doi.org/10.1007/s11227-012-0831-5

Pandey, S., et al. Security enforcement using TRBAC in cloud computing. in Computing, Communication and Automation (ICCCA), 2016 International Conference on. 2016. IEEE.

Raju, R., et al. A heuristic fault tolerant MapReduce framework for minimizing makespan in Hybrid Cloud Environment. in Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on. 2014. IEEE.

Rehman, S. and R. Gautam. Research on Access Control Techniques in SaaS of Cloud Computing. in International Symposium on Security in Computing and Communication. 2014. Springer. - https://doi.org/10.1007/978-3-662-44966-0_9

Riad, K., et al. AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. in Collaboration and Internet Computing (CIC), 2015 IEEE Conference on. 2015. IEEE.

Rittinghouse, J.W. and J.F. Ransome, Cloud computing: implementation, management, and security. 2016: CRC press.

Satoh, I. Toward Access Control Model for Context-Aware Services Offloaded to Cloud Computing. in Reliable Distributed Systems Workshops (SRDSW), 2016 IEEE 35th Symposium on. 2016. IEEE.

Varadharajan, V. and U. Tupakula, Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 2014. 11(1): p. 60-75. - https://doi.org/10.1109/TNSM.2014.041614.120394

Younis, Y.A., K. Kifayat, and M. Merabti, An access control model for cloud computing. Journal of Information Security and Applications, 2014. 19(1): p. 45-60. - https://doi.org/10.1016/j.jisa.2014.04.003
Mateen, A., Rauf, A., Hanan Abdullah, A., & Ashraf, M. (2018). Secure data access control with perception reasoning. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 7(1), 13–28. https://doi.org/10.14201/ADCAIJ2018711328

Downloads

Download data is not yet available.

Author Biography

Abdul Mateen

,
FUUAST
Computer Science DepartmentAssistant Professor 
+