Credit Value and Attribute Based Access Control Mechanism for Cloud Data Centres
Ajay Kumar Dubey1, Vimal Mishra2
1Ajay Kumar Dubey, Dr. A.P.J. Abdul Kalam Technical University, Lucknow, India.
2Vimal Mishra, Institute of Engineering and Rural Technology, Allahabad, India.
Manuscript received on 02 August 2019. | Revised Manuscript received on 07 August 2019. | Manuscript published on 30 September 2019. | PP: 6217-6225 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5734098319/2019©BEIESP | DOI: 10.35940/ijrte.C5734.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Now-a-days the cloud is very useful for providing many IT services. These services are delivered over the internet and accessed globally with the help of internet. The cloud service provider ensures flexibility in provisioning and scaling of resources. The cloud services are completely managed by cloud service provider (CSP), which ensures the end to end availability, reliability and security of the cloud resources. The exponential growth of cloud services has provided many opportunities but has also perplexed severe security concerns. The popularity of cloud service based applications is rapidly increasing due to which many security and legal issues are arising. In this paper we describe the existing access control method and framework for securing cloud services. The concept of modified reputation and attribute based access control system has been discussed. In this approach the concept of crowd reviewing has been used to compute the credit value of users. The simulation experiment has been shown to protect the consistent users and to restrict the access of inconsistent users in cloud environment. It is an access control approach to mitigate the challenges in security concerns. This access control mechanism is helpful for cloud application services, which automatically restrict the malicious users from the access of resources. It is also helpful in authorization of users to access the cloud resources.
Keywords: Access Control, Crowdreviewing, Crowd Voting, Cloud Computing and Credit Value.
Scope of the Article: Cloud Computing