Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application

Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application

Auxilia M., Raja K., Kannan K.
Copyright: © 2020 |Pages: 18
DOI: 10.4018/IJSDA.2020010104
Article PDF Download
Open access articles are freely available for download

Abstract

In the evolution of social networks and big data, secure information sharing is a crucial task. When information is shared between the user and the organization admin, security plays a key role in any business organization in terms of privacy. Though many fruitful solutions prevail to protect the data integrity and privacy, there is a huge space for novel data protection schemes where a large set of data are involved. In this article, the Cloud-Based Access Control (C-BAC) framework is proposed which can fit in any business organization application. In this C-BAC, Policy Enforcement Point (PEP) is used to avoid unwanted information sharing with the neighboring employee. C-BAC framework with RSA provides security, based on the number of employees with the data handled by the particular employee, better than the existing access control framework with asymmetric encryption standard (AES) and Rivest–Shamir–Adleman (RSA) in terms of individual information handling.
Article Preview
Top

Introduction

In recent days, web services are performing various computations on several scenarios like networks, big data and cloud computing, etc., where ambient computing plays a vital role. It acts as a framework to control several sets of services, resources to utilize it efficiently and seamlessly to any scenario. It also helps in making the services user-friendly and effective and it supports improved user interaction when the particular service is utilized for the users. Nowadays, resources are offered and utilized in large quantity, thus ambient computing plays an important role in cloud-based services.

Cloud Services in the web has been growing and attracting the attention of researchers based on issues like uncertainty during the authentication of Cloud services, lack of decision-making process during the authorization of services and information loss during confidential information exchange. World Wide Web plays a vital role in this current trend related to the concept of cloud technology. For every business organization, role provisioning is the initial step for every employee (Chandrashekar et al., 2017; Jonathan & Dusit, 2017). Every role provisioning system must have certain conditions to assign an appropriate role to the employee (Ilia & Rizos, 2016; Jonathan & Dusit, 2017). In general condition, ‘R’ provides a condition for each role assigned to all employees in the organization. The role of enrolment is done based on the concept of Role Based Access Control (RBAC) (Yiqun et al., 2008) which is used to assign a role in a suitable way. Then each employee must be assigned and allowed to use several services based on a particular application by integrating with the workflow foundation (Ilia, 2016). Workflow is a sequence of the inter-connected process which contains a set of operations that include work assigned to a particular person or a group of persons or a set of persons in an organization or a mechanism having a simple or complex procedure to perform. (Ward et al., 2015). As all know, large sets of information are in existence in all other domains including networks, data mining (Santosh, 2018) Big data (Feldiansyah, 2018) and machine learning (Lazaros & Ahmad, 2017; Brian, 2018), etc.

For the execution of the above workflow, scheduling the task is needed and several methodologies of the workflow are detailed as 1. The work process is executed based on calling a thread which is not generated especially for workflow process which means that the process calling has to wait until the workflow completes its process by the invoker. 2. When the work process executes its method using a new thread by the application. At the same time, the executed process calling will be paused. 3. Window Communication Foundation (WCF) will be served when the work process executes its method. The resultant work process which is served will use the data as input from the network which contains the activities of the host service. There are two condition policies, which are applied during the workflow execution. There should be a fixed condition for a certain role in an organization. Aggregate Zero Knowledge Proof knowledge (AgZKPk) protocol (Uwe et al., 2008) is used to provide privacy and authentication. There will be no fixed condition and the conditions can be framed as an employee identity attributes. Oblivious Commitment Based Envelope (OCBE) (Jiangtao et al., 2006) protocol is used for these situations.

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 11: 5 Issues (2022)
Volume 10: 4 Issues (2021)
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 4 Issues (2017)
Volume 5: 4 Issues (2016)
Volume 4: 4 Issues (2015)
Volume 3: 4 Issues (2014)
Volume 2: 4 Issues (2013)
Volume 1: 4 Issues (2012)
View Complete Journal Contents Listing