An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud

نویسندگان

چکیده

In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case. Considering the vulnerability data, its protection needs to consider an efficient and security scheme. data-oriented control, approach is generally static policy matching, which deal with emergencies has problem privileged users. To solve problem, paper proposes a risk-based control model, adds risk assessment attribute-based aims at source from three aspects: subject attribute, resource environment attribute. A set indexes proposed, calculation method quantitatively analyzed combining fuzzy consistency AHP analysis method, finally, realization XACML given. The validity proposed model analyzed, carried out experimental verifies effectiveness. benefits applications that require storage, for example, medical/patient storage.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Access Control Based Data Security in Cloud Computing

Cloud Computing is mainly about offering services on pay per user basis. It provides Storage-as-aService, where data owner can store their data in the cloud. Data is biggest asset to an organization and how confidentiality, authentication and access control can be outsourced. There is a threat to data owner that if CSP (Cloud Service Provider) is malicious or has some vulnerability. This paper ...

متن کامل

Data storage security in Cloud

Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper propo...

متن کامل

Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment

With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13053187