Towards Secure Risk-Adaptable Access Control in Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.
Authors and Affiliations
Salasiah Abdullah, Khairul Azmi Abu Bakar
Techniques, Tools and Applications of Graph Analytic
Graphs have acute significance because of poly-tropic nature and have wide spread real world big data appli-cations, e.g., search engines, social media, knowledge discovery, network systems, etc. Major challenge is to de...
Predicting Return Donor and Analyzing Blood Donation Time Series using Data Mining Techniques
Since blood centers in most countries typically rely on volunteer donors to meet the hospitals' needs, donor retention is critical for blood banks. Identifying regular donors is critical for the advance planning of blood...
One-Lead Electrocardiogram for Biometric Authentication using Time Series Analysis and Support Vector Machine
In this research, a person identification system has been simulated using electrocardiogram (ECG) signals as biometrics. Ten adult people were participated as the subjects in this research taken from their signal ECG usi...
Conceptual Level Design of Semi-structured Database System: Graph-semantic Based Approach
This paper has proposed a Graph – semantic based conceptual model for semi-structured database system, called GOOSSDM, to conceptualize the different facets of such system in object oriented paradigm. The model defines a...
Quantum Cost Optimization for Reversible Sequential Circuit
Reversible sequential circuits are going to be the significant memory blocks for the forthcoming computing devices for their ultra low power consumption. Therefore design of various types of latches has been considered a...