An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud
نویسندگان
چکیده
In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case. Considering the vulnerability data, its protection needs to consider an efficient and security scheme. data-oriented control, approach is generally static policy matching, which deal with emergencies has problem privileged users. To solve problem, paper proposes a risk-based control model, adds risk assessment attribute-based aims at source from three aspects: subject attribute, resource environment attribute. A set indexes proposed, calculation method quantitatively analyzed combining fuzzy consistency AHP analysis method, finally, realization XACML given. The validity proposed model analyzed, carried out experimental verifies effectiveness. benefits applications that require storage, for example, medical/patient storage.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملAccess Control Based Data Security in Cloud Computing
Cloud Computing is mainly about offering services on pay per user basis. It provides Storage-as-aService, where data owner can store their data in the cloud. Data is biggest asset to an organization and how confidentiality, authentication and access control can be outsourced. There is a threat to data owner that if CSP (Cloud Service Provider) is malicious or has some vulnerability. This paper ...
متن کاملData storage security in Cloud
Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper propo...
متن کاملEnsuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Serv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13053187