Analysis of Security-Based Access Control Models for Cloud Computing

Analysis of Security-Based Access Control Models for Cloud Computing

Sandeep Choudhary, Nanhay Singh
Copyright: © 2022 |Pages: 19
DOI: 10.4018/IJCAC.2022010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.
Article Preview
Top

1. Introduction

Cloud technology is a rising computing area where amenity of their infrastructure supplied as distinct services provided via internet. Cloud computing is summarized as a set of storage, hardware, networks, interfaces and services which combine to delivery resources as a services. According to Gartner (2019), the market of cloud solutions is assessed to increment 17.5% in 2019 to finish $214300 million, raised from $182400 million out of 2018. Gartner projects expansion and the industry size of the cloud solutions sector in almost three time the rise of IT services till 2022. Cloud technology supplies on demand and metered cost effective services (Zhang et al., 2010) i.e. software, infrastructure and platform as a services. Amazon’s EC2 and S3 (n.d.) services, Microsoft Azure (Chappell, 2008) and Google App Engine (n.d.) are common cloud computing services providing by these leading IT companies.

Figure 1.

Key Factors for Cloud Security

IJCAC.2022010104.f01

There are still staying an assortment of challenges associated with cloud security specifically information security, misuse of solutions, malicious entrant and kind of cyber-attacks in cloud computing. Data protection and access control (Kuyoro et al., 2011) are two major vital problems for cloud service provider. Key factors for cloud security (Morgan & Conboy, 2013) are classified as (see Figure 1) (a) Access control is a methodology or set of rule which allows, denies or limits access to some subject or object . (b) Data security means protecting the database from harmful forces along with the malicious activities of unauthorized hackers or subject. (c) Compliance (d) Availability (e) Governance. there are several issues to access record from cloud: (i) Data owner (DO) has to be constantly online. (ii) Searching cost is so high (iii) Time complexity is high for data accessing. (iv)Multiple jobs allocation and scheduling (v) Data redundancy and integrity. (vi) Data security.

1.1 Cloud Architecture

As stated by NIST (Liu et al., 2011), cloud computing is more recognized toward giving a very clear comprehension of cloud computing solutions. It supply a straight forward taxonomy of assistance models to cloud clients. It outlines four models: private model, public model, community and hybrid model. The NIST definition stipulates a 5 traits that every cloud companies demonstrate: resource pooling, speedy physical property, on demand service, wide network access and various computing services. Figure 2 represents NIST reference design model of cloud computing, which recognize the roles and activities of user.

Figure 2.

NIST Reference Design Model of Cloud Computing

IJCAC.2022010104.f02

NIST (Liu et al., 2011) classify five leading participating characters: Consumer, Provider, Auditor, Broker and Carrier. These core subject have played important role in era of cloud computing:

  • 1.

    Cloud-Consumer: A client that maintain the relationship between user and provider.

  • 2.

    Cloud-Provider: Someone is liable for making the support accessible for willing parties.

  • 3.

    Cloud-Auditor: A group that do independent evaluation of system functionality, cloud security and solutions.

  • 4.

    Cloud-Broker: A person that handles functionality, the uses and delivery of all solutions of cloud involving customer and the cloud supplier.

  • 5.

    Cloud-Carrier: An intermediate which offer transportation and the connectivity of cloud solutions from suppliers to customer.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing