A flexible fine-grained dynamic access control approach for cloud computing environment

  • PDF / 2,499,990 Bytes
  • 22 Pages / 595.276 x 790.866 pts Page_size
  • 75 Downloads / 194 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789().,-volV)

A flexible fine-grained dynamic access control approach for cloud computing environment Saima Mehraj1 • M. Tariq Banday1 Received: 7 December 2019 / Revised: 4 October 2020 / Accepted: 13 October 2020  Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract As a pioneeringsurge of ICT technologies, offering computing resources on-demand, the exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the same time, security stands as a most prior concern for this new progressive computing capability of on-demand services over the Internet. Hence, access control substantiates one of the fundamental conditions to fortify the information and Cloud system against illegitimate access among all the security requirements of Cloud computing. Although diverse access control models have been proposed and implemented for the Cloud computing paradigm, the models may fail to accomplish the dynamic and scalable requirements of the Cloud system adequately. Therefore, we propose a dynamic authorization system for a Cloud computing environment that employs the concept of role, task, and trustworthiness of the user. In this paper, a framework has been proposed that offers characteristics of both passive and active access control along with the trusted computing, thereby, blending the model into a more fine-grained and dynamic for the Cloud computing environment. Subsequently, the implementation of the propounded scheme is reported to provide the proof-of-concept. Additionally, the evaluation and use case scenario of the propounded system has been carried out to proclaim its effectiveness over other conventional models. Keywords Cloud computing  Discretionary access control  Mandatory access control  Role-based access control  Attribute-based access control  WMA–OWA

1 Introduction The establishment of extensive acceptance of the Cloud computing paradigm in the industrial sector, the academic sector, and the research community has proposed its picture as the next generation computational standard. In addition to this, the consumption and management of the computing infrastructure in the present IT era have undergone many improvements considerably. Being an open paradigm, Cloud computing empowers ubiquitous computing and commissions on-demand network access to a shared pool of configurable computing resources. Also, the provision of computation, storage, and software-based services over the & M. Tariq Banday [email protected] Saima Mehraj [email protected] 1

Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India

Internet has crowned Cloud computing with well-known popularity. However, security remains as one of the principal concerns and a noteworthy obstruction towards the endorsement of the Cloud model. Consequently, the procurement of security in such a highly dynamic environment does not come without a great deal of unreliability when Cloud computing represents a relatively distr