Improving Performance of ABAC Security Policies Validation using a Novel Clustering Approach

被引:0
作者
Vijayalakshmi, K. [1 ]
Jayalakshmi, V [2 ]
机构
[1] Vels Inst Sci Technol & Adv Studies, Chennai, Tamil Nadu, India
[2] Vels Inst Sci Technol & Adv Studies, Sch Comp Sci, Chennai, Tamil Nadu, India
关键词
Anomalies; attribute-based access control model; big data; cloud storage; clustering; intrusion detection system; security policy;
D O I
10.14569/IJACSA.2021.0120531
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing offers several services, such as storage, software, networking, and other computing services. Cloud storage is a boon for big data and big data owners. Although big data owners can easily avail cloud storage without spending much on infrastructure and software to manage their data, security is a big issue, and protecting the outsourced big data is challenging and ongoing research. Cloud service providers use the attribute-based access control model to detect malicious intruders and address the security requirements of today's new computing technologies. Anomalies in security policies are removed to improve the efficiency of the access control model. This paper implements a novel clustering approach to cluster security policies. Our proposed approach uses a rule-specific cluster merging technique that compares the rule with the clusters where the probability of similarity is high. Hence this technique reduces the cost, time, and complexity of clustering. Rather than verifying all rules, detecting and removing anomalies in every cluster of rules improve the performance of the intrusion detection system. Our novel clustering approach is useful for the researchers and practitioners in the ABAC policy validation.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 50 条
  • [1] Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
    El Hadj, Maryem Ait
    Erradi, Mohammed
    Khoumsi, Ahmed
    Benkaouz, Yahya
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5330 - 5332
  • [2] Improving Systems Design Using a Clustering Approach
    Czibula, Istvan Gergely
    Serban, Gabriela
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (12): : 40 - 49
  • [3] An experimental validation of a novel clustering approach to PWARX identification
    Lassoued, Zeineb
    Abderrahim, Kamel
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2014, 28 : 201 - 209
  • [4] Improving Autoencoders Performance for Hyperspectral Unmixing Using Clustering
    Grabowski, Bartosz
    Glomb, Przemyslaw
    Ksiazek, Kamil
    Buza, Krisztian
    RECENT CHALLENGES IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, 2022, 1716 : 102 - 121
  • [5] On using cache conscious clustering for improving OODBMS performance
    He, Zhen
    Lai, Richard
    Marquez, Alonso
    INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (11) : 1073 - 1082
  • [6] Improving search result clustering using nature inspired approach
    Mehrotra, Shashi
    Sharan, Aditi
    Varish, Naushad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (23) : 62971 - 62988
  • [7] A novel logic-based automatic approach to constructing compliant security policies
    BAO YiBao1
    2Institute of Electronic Technology
    3Beijing University of Posts and Telecommunications
    4Graduate University
    ScienceChina(InformationSciences), 2012, 55 (01) : 149 - 164
  • [8] A novel logic-based automatic approach to constructing compliant security policies
    YiBao Bao
    LiHua Yin
    BinXing Fang
    Li Guo
    Science China Information Sciences, 2012, 55 : 149 - 164
  • [9] A novel logic-based automatic approach to constructing compliant security policies
    Bao YiBao
    Yin LiHua
    Fang BinXing
    Guo Li
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (01) : 149 - 164
  • [10] A NOVEL CLUSTERING FRAMEWORK USING FARTHEST NEIGHBOUR APPROACH
    Shukla, Aparna
    Kanungo, Suvendu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 164 - 169