首页    期刊浏览 2025年04月18日 星期五
登录注册

文章基本信息

  • 标题:Outsourced Security Policy Updates Through Role Hierarchies for Security and Isolation in Cloud Computing
  • 本地全文:下载
  • 作者:Aditi Vyas ; Prof. Hemant Kumar Pathak
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2015
  • 卷号:6
  • 期号:1
  • 页码:640-646
  • 出版社:TechScience Publications
  • 摘要:Cloud computing is a shared medium used for effectively utilizing the resources to deliver computing capabilities as a service. It gives a combined effect derived from multiple computing paradigms such as distributed, autonomic, grid, elasticity and utility. The cloud provides services in browser dependent environment from trusted third party server. Here, elasticity offers varying load on the processing servers with a large number of users simultaneously working on distributed applications and hence their verification and authorization become less concern process. Taking the advantage of this less secure transition, insider or outsider attacker tries to destroy the data privileges by accessing and modifying the records without permissions. It gets controlled by using some role based access control and fine grained access policies. But still the traditional systems of the RBAC model get the process stuck in performance ad updates bottleneck. Also the verification, policy allotment, role activation and continuous monitoring of users' behavior is still not achieved. This paper presents a new model for handling outsourced policies with their updates using role hierarchies based allotment. Such operations make the users data more isolated from other processes, users and exchanges. The aim is towards making the policy based security more robust and reliable through multilevel verification and authorization. At the analytical evaluation, approach is proving its strong presence in front of existing system and future result will guide various applications security considering cloud based outsourced environment in mind
  • 关键词:Cloud Computing; Security; Confidentiality and;Access Control; Role Based Models; Policy Updates
国家哲学社会科学文献中心版权所有