Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
Urvashi Rahul Saxena () and
Taj Alam ()
Additional contact information
Urvashi Rahul Saxena: Jaypee Institute of Information Technology, Noida
Taj Alam: Jaypee Institute of Information Technology, Noida
International Journal of System Assurance Engineering and Management, 2023, vol. 14, issue 6, No 40, 2559-2578
Abstract:
Abstract Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic period, particularly for data storage and pay-per-use services. Restricted and reliable access control is essential for protecting the data stored in the cloud. The traditional role-based access control techniques are ineffective in multi-tenant computing systems like the cloud. To provide security in cloud computing systems and offer a trusted environment for service providers and service users, we present a trust-oriented role-based access control paradigm in this work. The Trust Management System's reputation is something that TRBAC wants to uphold by ensuring that various cloud threats do not compromise the service requests made and used by individual users. Validation and analysis of the membership credentials of users and roles mapped in the access control list ensure restricted access control in TRBAC. The proposed model intends to assist the data owners in identifying reliable service users and service providers by reviewing the interaction history and assessing direct, indirect, and weighted trust. This paper demonstrates how calculated trust values detect nefarious nodes and recommend defense mechanisms against various security concerns, including the Sybil attack, the On–off attack, the Collusion attack, and the DoS attack. To illustrate the impact of the suggested mitigation techniques and to handle various security concerns, a comparative analysis of the TRBAC model is done with its peers.
Keywords: Trust; Collusion attack; On–off attack; Sybil attack; DoS attack; Role-based access control (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s13198-023-02112-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:14:y:2023:i:6:d:10.1007_s13198-023-02112-x
Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198
DOI: 10.1007/s13198-023-02112-x
Access Statistics for this article
International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar
More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().