Abstract

Cloud computing offers several services, such as storage, software, networking, and other computing services. Cloud storage is a boon for big data and big data owners. Although big data owners can easily avail cloud storage without spending much on infrastructure and software to manage their data, security is a big issue, and protecting the outsourced big data is challenging and ongoing research. Cloud service providers use the attribute-based access control model to detect malicious intruders and address the security requirements of today’s new computing technologies. Anomalies in security policies are removed to improve the efficiency of the access control model. This paper implements a novel clustering approach to cluster security policies. Our proposed approach uses a rule-specific cluster merging technique that compares the rule with the clusters where the probability of similarity is high. Hence this technique reduces the cost, time, and complexity of clustering. Rather than verifying all rules, detecting and removing anomalies in every cluster of rules improve the performance of the intrusion detection system. Our novel clustering approach is useful for the researchers and practitioners in the ABAC policy validation.

Highlights

  • Cloud storage is one of the most beneficial services to leverage and manage big data efficiently [1]

  • In this paper we described the major four access control models Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC), and Attribute Based Access Control (ABAC) models

  • We can improve the performance of the detection mechanism by detecting anomalies in every cluster of similar rules, instead of detecting in every rule

Read more

Summary

Introduction

Cloud storage is one of the most beneficial services to leverage and manage big data efficiently [1]. Cloud service providers use various access control models to implement the Intrusion Detection System [7] [8]. The access control model is a function that identifies whether a requested operation on a shared object(resource) is legal or not [9]. The access control models use rules to determine which user can get what types of accesses for a shared resource. It manages all access-rights and access-conflicts over the shared resources [10]. The access control models use the term subject to refer to the process being executed for a single user or an organization, which requests access for the object. In this paper we described the major four access control models Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC), and Attribute Based Access Control (ABAC) models

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.