Towards Secure Risk-Adaptable Access Control in Cloud Computing

Abstract

The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Authors and Affiliations

Salasiah Abdullah, Khairul Azmi Abu Bakar

Keywords

Related Articles

Resources Management of High Speed Downlink Packet Access Network in the Presence of Mobility

High-Speed Downlink Protocol Access (HSDPA) is a mobile telephony protocol. It is designed to increase data capacity and transfer rate. This paper presents a resource allocation strategy in the HSDPA broadband network. A...

Framework for Assessing Privacy of Internet Applications

This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) prov...

The Performance between XEN-HVM, XEN-PV and Open-VZ during live-migration  

The aim of this paper is to compare the performance between three hypervisors: XEN-PV, XEN-HVM and Open-VZ. We have simulated the migration of a virtual machine by using a warning failure approach. Based on some experime...

A Systematic Literature Review of Success Factors and Barriers of Agile Software Development

Motivator and demotivator plays an important role in software industry. It encompasses software performance and productivity which are necessary for projects of Agile software development (ASD). Existing studies comprise...

BYOD Implementation Factors in Schools: A Case Study in Malaysia

The Bring Your Own Device (BYOD) initiative has been implemented widely in developed countries as a mechanism to prepare the students for the 4th industrial revolution. Success stories of the initiative vary depending on...

Download PDF file
  • EP ID EP429197
  • DOI 10.14569/IJACSA.2018.091247
  • Views 76
  • Downloads 0

How To Cite

Salasiah Abdullah, Khairul Azmi Abu Bakar (2018). Towards Secure Risk-Adaptable Access Control in Cloud Computing. International Journal of Advanced Computer Science & Applications, 9(12), 324-330. https://europub.co.uk/articles/-A-429197