期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2015
卷号:6
期号:1
页码:640-646
出版社:TechScience Publications
摘要:Cloud computing is a shared medium used for effectively utilizing the resources to deliver computing capabilities as a service. It gives a combined effect derived from multiple computing paradigms such as distributed, autonomic, grid, elasticity and utility. The cloud provides services in browser dependent environment from trusted third party server. Here, elasticity offers varying load on the processing servers with a large number of users simultaneously working on distributed applications and hence their verification and authorization become less concern process. Taking the advantage of this less secure transition, insider or outsider attacker tries to destroy the data privileges by accessing and modifying the records without permissions. It gets controlled by using some role based access control and fine grained access policies. But still the traditional systems of the RBAC model get the process stuck in performance ad updates bottleneck. Also the verification, policy allotment, role activation and continuous monitoring of users' behavior is still not achieved. This paper presents a new model for handling outsourced policies with their updates using role hierarchies based allotment. Such operations make the users data more isolated from other processes, users and exchanges. The aim is towards making the policy based security more robust and reliable through multilevel verification and authorization. At the analytical evaluation, approach is proving its strong presence in front of existing system and future result will guide various applications security considering cloud based outsourced environment in mind
关键词:Cloud Computing; Security; Confidentiality and;Access Control; Role Based Models; Policy Updates