scholarly journals Credit Value and Attribute Based Access Control Mechanism for Cloud Data Centres

2019 ◽  
Vol 8 (3) ◽  
pp. 6217-6225

Now-a-days the cloud is very useful for providing many IT services. These services are delivered over the internet and accessed globally with the help of internet. The cloud service provider ensures flexibility in provisioning and scaling of resources. The cloud services are completely managed by cloud service provider (CSP), which ensures the end to end availability, reliability and security of the cloud resources. The exponential growth of cloud services has provided many opportunities but has also perplexed severe security concerns. The popularity of cloud service based applications is rapidly increasing due to which many security and legal issues are arising. In this paper we describe the existing access control method and framework for securing cloud services. The concept of modified reputation and attribute based access control system has been discussed. In this approach the concept of crowd reviewing has been used to compute the credit value of users. The simulation experiment has been shown to protect the consistent users and to restrict the access of inconsistent users in cloud environment. It is an access control approach to mitigate the challenges in security concerns. This access control mechanism is helpful for cloud application services, which automatically restrict the malicious users from the access of resources. It is also helpful in authorization of users to access the cloud resources.

2021 ◽  
Vol 17 (4) ◽  
pp. 75-88
Author(s):  
Padmaja Kadiri ◽  
Seshadri Ravala

Security threats are unforeseen attacks to the services provided by the cloud service provider. Depending on the type of attack, the cloud service and its associated features will be unavailable. The mitigation time is an integral part of attack recovery. This research paper explores the different parameters that will aid in predicting the mitigation time after an attack on cloud services. Further, the paper presents machine learning models that can predict the mitigation time. The paper presents the kernel-based machine learning models that can predict the average mitigation time during security attacks. The analysis of the results shows that the kernel-based models show 87% accuracy in predicting the mitigation time. Furthermore, the paper explores the performance of the kernel-based machine learning models based on the regression-based predictive models. The regression model is used as a benchmark model to analyze the performance of the machine learning-based predictive models in the prediction of mitigation time in the wake of an attack.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


2020 ◽  
Vol 12 ◽  
pp. 184797901989744 ◽  
Author(s):  
Panjun Sun

Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.


2020 ◽  
Vol 31 (4) ◽  
pp. 411-424
Author(s):  
Han Lai ◽  
Huchang Liao ◽  
Zhi Wen ◽  
Edmundas Kazimieras Zavadskas ◽  
Abdullah Al-Barakati

With the rapid growth of available online cloud services and providers for customers, the selection of cloud service providers plays a crucial role in on-demand service selection on a subscription basis. Selecting a suitable cloud service provider requires a careful analysis and a reasonable ranking method. In this study, an improved combined compromise solution (CoCoSo) method is proposed to identify the ranking of cloud service providers. Based on the original CoCoSo method, we analyze the defects of the final aggregation operator in the original CoCoSo method which ignores the equal importance of the three subordinate compromise scores, and employ the operator of “Linear Sum Normalization” to normalize the three subordinate compromise scores so as to make the results reasonable. In addition, we introduce a maximum variance optimization model which can increase the discrimination degree of evaluation results and avoid inconsistent ordering. A numerical example of the trust evaluation of cloud service providers is given to demonstrate the applicability of the proposed method. Furthermore, we perform sensitivity analysis and comparative analysis to justify the accuracy of the decision outcomes derived by the proposed method. Besides, the results of discrimination test also indicate that the proposed method is more effective than the original CoCoSo method in identifying the subtle differences among alternatives.


Author(s):  
Saravana Kumar N. ◽  
Rajya Lakshmi Gubburi Venkataramana ◽  
Balamurugan B.

Cloud computing is one of most fast developing technology and many organizations are now offering a wide range of cloud services. Although the services provided are the same there is no common programming language, technology and protocol to access the entirety of the cloud services. Client who use a service provided by a certain organization are often limited and confined to that specific organization its structure and technologies. A Cloud federation is one solution to that interoperability through which computing resources of one Cloud Service Provider is rented or sold to another service provider or the services provided by one Cloud Service Provider is replicated into another Cloud Service Provider without having to lose any functionality and performance. This process is a tedious task and is prone to multiple limitations. In this paper we proposed the architectural framework and algorithm for the possible interoperability between the cloud service providers based on SLA in prospective of health sector as the application of cloud in health sector is highly needed in future.


Symmetry ◽  
2020 ◽  
Vol 12 (6) ◽  
pp. 1050
Author(s):  
Zhenghao Xin ◽  
Liang Liu ◽  
Gerhard Hancke

This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic managing and enforcing the permissions of an authorized device if the device is offline. Moreover, most smart lock systems lack fine-grained access control and cascading removal of permissions. In this paper, we leverage attribute-based access control mechanisms to manage the access of visitors with different identities. We use identity-based encryption to verify the identity of the visitor. In our proposed system, the administrator uses the policy set in the smart lock to implement access control on the device side, which reduces the dependence of access control on the server. We set attributes such as role, time, date, and location to have fine-grained control over access to different permissions and roles that might appear in the house. And the scheme provides the cascading delete function while providing the group access function. Our solution considers multiple roles in the home as well as hierarchical management issues, and improves the applicability of the smart lock system in complex residential and commercial situations. In the experimental section, we show that our system can be applied to premises with many different inhabitant identities.


2018 ◽  
Vol 8 (1) ◽  
pp. 45-52
Author(s):  
Sanjiv Chourasia ◽  
Linying Dong

CanTel was one of the fastest growing Canadian telecommunications companies that provided telephone, cable, Internet, and cloud services. In 2015, the company employed over 40,000 employees and boasted of achieving over Cdn$10 billion of annual revenue and serving over 10 million customers. As a cloud service provider, the company faced a dilemma of not being able to fulfill the IT needs of its internal business units. As a result, one of the business units, Digital Channel, resorted to a third-party cloud service, and this set an example for other business units to follow suit. Jeff Smith, the CEO of the company CanTel, and the CIO Jane Lockhart had to find a solution to the issue that had significant implications to its business-IT alignment and IT governance.


Sign in / Sign up

Export Citation Format

Share Document