Towards Secure Risk-Adaptable Access Control in Cloud Computing

Abstract

The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Authors and Affiliations

Salasiah Abdullah, Khairul Azmi Abu Bakar

Keywords

Related Articles

A Multi-Stage Optimization Model With Minimum Energy Consumption-Wireless Mesh Networks

Optimization models related with routing, bandwidth utilization and power consumption are developed in the wireless mesh computing environment using the operations research techniques such as maximal flow model, transshi...

Estimation of Trajectory and Location for Mobile Sound Source

In this paper, we present an approach to estimate mobile sound source trajectory. An artificially created sound source signal is used in this work. The main aim of this paper is to estimate the mobile object trajectory v...

Decision Support System for Diabetes Mellitus through Machine Learning Techniques

recently, the diseases of diabetes mellitus have grown into extremely feared problems that can have damaging effects on the health condition of their sufferers globally. In this regard, several machine learning models ha...

Web and Telco Service Integration: A Dynamic and Adaptable Approach

The current evolution of the Web, known as Web 2.0 and characterized by providing a diverse global service ecosystem, has marked a change in the role played by telecom operators. In order to maintain high competitive mar...

Sensor Node Deployment Strategy for Maintaining Wireless Sensor Network Communication Connectivity

 - We propose a rescue robot sensor network system in which a teleoperated rescue robot sets up a wireless sensor network (WSN) to gather disaster information in post-disaster underground spaces. In this system, the...

Download PDF file
  • EP ID EP429197
  • DOI 10.14569/IJACSA.2018.091247
  • Views 85
  • Downloads 0

How To Cite

Salasiah Abdullah, Khairul Azmi Abu Bakar (2018). Towards Secure Risk-Adaptable Access Control in Cloud Computing. International Journal of Advanced Computer Science & Applications, 9(12), 324-330. https://europub.co.uk/articles/-A-429197