Towards Secure Risk-Adaptable Access Control in Cloud Computing

Abstract

The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Authors and Affiliations

Salasiah Abdullah, Khairul Azmi Abu Bakar

Keywords

Related Articles

Method for Extracting Product Information from TV Commercial 

Television (TV) Commercial program contains important product information that displayed only in seconds. People who need that information has no insufficient time for noted it, even just for reading that information. Th...

Design of Embedded Vision System based on FPGA-SoC

The advanced micro-electronics in the last decades provide each year new tools and devices making it possible to design more and more efficient artificial vision systems capable of meeting the constraints imposed. All th...

Prediction of Stroke using Data Mining Classification Techniques

Stroke is a neurological disease that occurs when a brain cells die as a result of oxygen and nutrient deficiency. Stroke detection within the first few hours improves the chances to prevent complications and improve hea...

Simulation and Analysis of Optimum Golomb Ruler Based 2D Codes for OCDMA System

The need for high speed communications networks has led the research communities and industry to develop reliable, scalable transatlantic and transpacific fiber-optic communication links. In this paper the optimum Golomb...

2-D Object Recognition Approach using Wavelet Transform

Humans have supernatural ability to observe, analyze, and tell about the layout of the 3D world with the help of their natural visual system. But contrary to machine vision system, it remains a most difficult task to rec...

Download PDF file
  • EP ID EP429197
  • DOI 10.14569/IJACSA.2018.091247
  • Views 61
  • Downloads 0

How To Cite

Salasiah Abdullah, Khairul Azmi Abu Bakar (2018). Towards Secure Risk-Adaptable Access Control in Cloud Computing. International Journal of Advanced Computer Science & Applications, 9(12), 324-330. https://europub.co.uk/articles/-A-429197