An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud

被引:4
作者
Alharbe, Nawaf [1 ]
Aljohani, Abeer [1 ]
Rakrouki, Mohamed Ali [2 ,3 ,4 ]
Khayyat, Mashael [5 ]
机构
[1] Taibah Univ, Appl Coll, Medina 42353, Saudi Arabia
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Univ Tunis, Ecole Super Sci Econ & Commerciales Tunis, Montfleury 1089, Tunisia
[4] Univ Tunis, Business Analyt & Decis Making Lab BADEM, Tunis Business Sch, Bir El Kassaa 2059, Tunisia
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 23445, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
关键词
computer security; cloud computing; cloud storage; secure medical data storage;
D O I
10.3390/app13053187
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case. Considering the vulnerability of dynamic data, its protection needs to consider an efficient and dynamic security protection scheme. In data-oriented access control, the traditional approach is generally static policy matching, which cannot deal with emergencies and has the problem of privileged users. To solve this problem, this paper proposes a data-oriented risk-based access control model, which adds risk assessment to the traditional attribute-based access control and aims at the source of risk from three aspects: subject attribute, resource attribute, and environment attribute. A set of risk assessment indexes is proposed, and the calculation method of risk assessment is quantitatively analyzed by combining fuzzy consistency AHP analysis method, and finally, the realization of XACML is given. The validity of the proposed model is analyzed, and the carried out experimental analysis verifies its effectiveness. The proposed model benefits cloud data storage applications that require dynamic data storage, for example, medical/patient data storage.
引用
收藏
页数:17
相关论文
共 31 条
[1]   Traditional and Hybrid Access Control Models: A Detailed Survey [J].
Aftab, Muhammad Umar ;
Hamza, Ali ;
Oluwasanmi, Ariyo ;
Nie, Xuyun ;
Sarfraz, Muhammad Shahzad ;
Shehzad, Danish ;
Qin, Zhiguang ;
Rafiq, Ammar .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[2]  
Almutairi S, 2021, INT J ADV COMPUT SC, V12, P339
[3]  
Aluvalu RajaniKanth., 2015, Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume, V1, P653, DOI [10.1007/978-3-319-13728-573, DOI 10.1007/978-3-319-13728-573]
[4]   Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model [J].
Atlam, Hany F. ;
Azad, Muhammad Ajmal ;
Fadhel, Nawfal F. .
SENSORS, 2022, 22 (05)
[5]   Risk-Based Access Control Model: A Systematic Literature Review [J].
Atlam, Hany F. ;
Azad, Muhammad Ajmal ;
Alassafi, Madini O. ;
Alshdadi, Abdulrahman A. ;
Alenezi, Ahmed .
FUTURE INTERNET, 2020, 12 (06)
[6]   An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things [J].
Atlam, Hany F. ;
Alenezi, Ahmed ;
Walters, Robert J. ;
Wills, Gary B. .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :254-260
[7]  
Badar Nazia., 2013, Automated Security Management, P79, DOI DOI 10.1007/978-3-319-01433-3_5
[8]   Critical Comparison of Access Control Models for Cloud Computing [J].
Beraka, Mutaz ;
Al-Muhtadi, Jalal .
JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03) :431-442
[9]  
[Беззатеев С.В. Bezzateev S.V.], 2021, [Научно-технический вестник информационных технологий, механики и оптики, Scientific and Technical Journal of Information Technologies, Mechanics and Optics, Nauchno-tekhnicheskii vestnik informatsionnykh tekhnologii, mekhaniki i optiki], V21, P553, DOI 10.17586/2226-1494-2021-21-4-553-561
[10]  
Bijon KZ, 2013, IEEE CONF COMM NETW, P462, DOI 10.1109/CNS.2013.6682761