Risk based access control in cloud computing

No Thumbnail Available

Date

2016

Authors

Lakshmi, H.
Namitha, S.
Seemanthini
Gopalan, S.
Sanjay, H.A.
Chandrashekaran, K.
Bhaskar, A.

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement. � 2015 IEEE.

Description

Keywords

Citation

Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, 2016, Vol., , pp.1502-1505

Endorsement

Review

Supplemented By

Referenced By