Abstract

The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from unauthorized accesses. In cloud, users are not legendary by their predefined identities. Instead, they are providing accesses based on their characteristics and attributes. This work is focusing on available access control mechanisms and one that applicable for cloud environment. The paper also proposes an Efficient and Flexible Role-Based Access Control (EF-RBAC) mechanism for the cloud computing environment to achieve confidentiality and security. RBAC limits the accesses for resources within an organization to authorized users only and also guarantees that a user can solely access specific information they are authorized for by the organization policy. The proposed scheme adds flexibility to the RBAC for better cloud user’s experience.

Highlights

  • IntroductionCloud computing creates several computing resources (computing centers, huge data centers, etc.) to work in a collaborative network system over the internet

  • Cloud computing creates several computing resources to work in a collaborative network system over the internet

  • Delegation of accesses and capabilities: In cloud environment where users are not recognized by their identities and they are just concerned about the fulfillment of their general tasks, a flexible access control system with dynamic resource management capability plays a vital role in delegation of accesses and capabilities for various users based on their roles in the organization

Read more

Summary

Introduction

Cloud computing creates several computing resources (computing centers, huge data centers, etc.) to work in a collaborative network system over the internet. A secure, huge and fast network of data storage and computing is supported by the cloud for all kinds of users [1]. An effective mechanism for access control and management can play a crucial role as it is directly linked with the primary required characteristics those are authorization, confidentiality, availability, and integrity. Role-based access control (RBAC): In RBAC every user is assigned a specific role that supports their job requirements within the organization and access is provided for numerous objects [33]. Multiple roles can be linked to a single person on a required basis These kinds of access models are additional, versatile and scalable than the opposite varieties. The further sections intend to propose an efficient and flexible Role-based access control scheme for the dynamic cloud environment and identify future research directions

Requirements of RBAC
Related work
Proposed scheme
Essential components
Methodology applied
Start Simulation by submitting array of VMs to DataCenter Broker
Case study
Case Study
Scalability
Analysis
Benefits
Limitations of the proposed scheme
Conclusion and future scope

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.