Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud

2017 ◽  
Vol 26 (04) ◽  
pp. 1750003 ◽  
Author(s):  
Khaled Riad ◽  
Zhu Yan

Providing a creditable basis for access control decision-making is not an easy task for the resource pooling, dynamic, and multi-tenant cloud environment. The trust notation can provide this creditable basis, based on multiple factors that can accurately compute the user’s trust for the granting access entity. In this paper, the formal trust model has been introduced, which presents a novel method to provide the basis for granting access. It is based on three factors and their semantic relations, which investigate important measures for the cloud environment. Also, a new Trust-Based Access Control (TB-AC) model has been proposed. The proposed model supports dynamically changing the user’s assigned permissions based on its trust level. In addition, TB-AC ensures secure resource sharing among potential untrusted tenants. TB-AC has been deployed on a separated VM in our private cloud environment, which is built using OpenStack. The experimental results indicated that TB-AC can evaluate access requests within reasonable and acceptable processing times, which is based on the final trust level calculation and the communication between TB-AC and some of the intended OpenStack services. By considering very rough conditions and huge traffic overhead, the final trust level can be calculated in an average time of 200[Formula: see text]ms. Furthermore, the communication overhead between TB-AC and each of Keystone, Nova, and Neutron is very light. Finally, TB-AC has been tested under different scenarios and is provable, usable and scalable.

2021 ◽  
Author(s):  
Qikun Zhang ◽  
Liang Zhu ◽  
Yimeng Wu ◽  
Jianyong Li ◽  
Yinghui Meng ◽  
...  

Abstract Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources and resources can only be accessed by authorized legal users.However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. To deal with these problems, this paper proposes a dynamic access control technology based on privacy protection. Compared with existing access control technologies, the main advantages of this paper are as follows: 1) encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; 2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol safe under the hardness assumption of the discrete logarithm problem (DLP) and the decision bilinear Diffie-Hellman (DBDH) problem. Compared with the cited references, it has the advantages of low computational complexity, short computational time, and low communication overhead.


Author(s):  
Pramod P Pillai ◽  
Venkataratnam P. ◽  
Siva Yellampalli

Cloud computing is becoming a de facto standard for most of the emerging technology solutions. In a typical cloud environment, various tenants purchase the compute, storage resource, and would be sharing the resource with other tenants. Sharing of the resources among various tenants is not popular due to the security concerns. There are few solutions that try to solve the security problem of resource sharing among tenants. Having a trusted mediator between multiple tenants is one of the methods. Few research papers have been written, and this chapter attempts to enhance one of the published solutions: Cross-tenant access control model for cloud computing. Most of the existing research papers explore the theoretical way to solve the problem. This project develops a working prototype and proves how resource sharing can be achieved. This research develops the concept of resource sharing activation, where the resource can be shared with multiple cloud tenant and the deactivation where the shared resources can be removed from the shared resource pool.


2021 ◽  
pp. 143-157
Author(s):  
Mingshan You ◽  
Jiao Yin ◽  
Hua Wang ◽  
Jinli Cao ◽  
Yuan Miao

Author(s):  
Justin Parkhurst ◽  
Ludovica Ghilardi ◽  
Jayne Webster ◽  
Robert W Snow ◽  
Caroline A Lynch

Abstract This article explores how malaria control in sub-Saharan Africa is shaped in important ways by political and economic considerations within the contexts of aid-recipient nations and the global health community. Malaria control is often assumed to be a technically driven exercise: the remit of public health experts and epidemiologists who utilize available data to select the most effective package of activities given available resources. Yet research conducted with national and international stakeholders shows how the realities of malaria control decision-making are often more nuanced. Hegemonic ideas and interests of global actors, as well as the national and global institutional arrangements through which malaria control is funded and implemented, can all influence how national actors respond to malaria. Results from qualitative interviews in seven malaria-endemic countries indicate that malaria decision-making is constrained or directed by multiple competing objectives, including a need to balance overarching global goals with local realities, as well as a need for National Malaria Control Programmes to manage and coordinate a range of non-state stakeholders who may divide up regions and tasks within countries. Finally, beyond the influence that political and economic concerns have over programmatic decisions and action, our analysis further finds that malaria control efforts have institutionalized systems, structures and processes that may have implications for local capacity development.


2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


2017 ◽  
Vol 44 (2) ◽  
pp. 308-314 ◽  
Author(s):  
T. J. Tang ◽  
S. Yang ◽  
Y. Peng ◽  
K. Yin ◽  
R. Zou

Sign in / Sign up

Export Citation Format

Share Document