Towards secure Risk-Adaptable Access Control in cloud computing

Salasiah Abdullah, Khairul Azmi Abu Bakar 

Research output: Contribution to journalArticle

Abstract

The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Original languageEnglish
Pages (from-to)324-330
Number of pages7
JournalInternational Journal of Advanced Computer Science and Applications
Volume9
Issue number12
DOIs
Publication statusPublished - 1 Jan 2018

Fingerprint

Cloud computing
Access control
Authentication

Keywords

  • Authentication
  • Cloud computing
  • Privacy
  • Risk-adaptable access control
  • Security

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Towards secure Risk-Adaptable Access Control in cloud computing. / Abdullah, Salasiah; Abu Bakar , Khairul Azmi.

In: International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 01.01.2018, p. 324-330.

Research output: Contribution to journalArticle

@article{707b4b0f5efa4ea5bc967e4c83e68673,
title = "Towards secure Risk-Adaptable Access Control in cloud computing",
abstract = "The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.",
keywords = "Authentication, Cloud computing, Privacy, Risk-adaptable access control, Security",
author = "Salasiah Abdullah and {Abu Bakar }, {Khairul Azmi}",
year = "2018",
month = "1",
day = "1",
doi = "10.14569/IJACSA.2018.091247",
language = "English",
volume = "9",
pages = "324--330",
journal = "International Journal of Advanced Computer Science and Applications",
issn = "2158-107X",
publisher = "Science and Information Organization",
number = "12",

}

TY - JOUR

T1 - Towards secure Risk-Adaptable Access Control in cloud computing

AU - Abdullah, Salasiah

AU - Abu Bakar , Khairul Azmi

PY - 2018/1/1

Y1 - 2018/1/1

N2 - The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

AB - The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

KW - Authentication

KW - Cloud computing

KW - Privacy

KW - Risk-adaptable access control

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=85059508311&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059508311&partnerID=8YFLogxK

U2 - 10.14569/IJACSA.2018.091247

DO - 10.14569/IJACSA.2018.091247

M3 - Article

VL - 9

SP - 324

EP - 330

JO - International Journal of Advanced Computer Science and Applications

JF - International Journal of Advanced Computer Science and Applications

SN - 2158-107X

IS - 12

ER -