Abstract

The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Highlights

  • Cloud computing has shown a great impact in improvising information sharing between users from a different geographical location

  • Informal security analysis shows the capability of authentication scheme in managing secure transaction

  • Security risks and privacy challenges in cloud should be taken into serious considerations

Read more

Summary

Introduction

Cloud computing has shown a great impact in improvising information sharing between users from a different geographical location. It has led to a greater impact of knowledge sharing as people from different geographical location have the opportunity to access the cloud and share files without limited boundaries and network restriction. Cloud computing is known as one of the best platform [1], [2] to meet the needs of consumers as it provides the platform of unlimited storage, managing and accessing data via network of remote server hosted on the internet. Cloud computing has been the major savior to serve the rising needs of user who demands for storage capabilities and security as more and more documents are being created daily. The escalation of trust relationship [5] between user and cloud provider is crucial in managing secured storage in cloud to cater the demand of user and resources that keeps growing

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.