CFP last date
20 December 2024
Reseach Article

ACCFLA: Access Control in Cloud Federation using Learning Automata

by Behnaz Seyed Taheri, Mostafa Ghobaei Arani, Mehrdad Maeen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 6
Year of Publication: 2014
Authors: Behnaz Seyed Taheri, Mostafa Ghobaei Arani, Mehrdad Maeen
10.5120/18758-0028

Behnaz Seyed Taheri, Mostafa Ghobaei Arani, Mehrdad Maeen . ACCFLA: Access Control in Cloud Federation using Learning Automata. International Journal of Computer Applications. 107, 6 ( December 2014), 30-40. DOI=10.5120/18758-0028

@article{ 10.5120/18758-0028,
author = { Behnaz Seyed Taheri, Mostafa Ghobaei Arani, Mehrdad Maeen },
title = { ACCFLA: Access Control in Cloud Federation using Learning Automata },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 6 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number6/18758-0028/ },
doi = { 10.5120/18758-0028 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:23.381329+05:30
%A Behnaz Seyed Taheri
%A Mostafa Ghobaei Arani
%A Mehrdad Maeen
%T ACCFLA: Access Control in Cloud Federation using Learning Automata
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 6
%P 30-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, cloud computing has been applied increasingly and most of the companies, have considered some kinds of cloud strategies to use in their organizations. Growing request for services causes overload on a single cloud. Cloud federation is an ideal solution to overcome continuous increasing requests by users. Identity management and access control are from challenging subjects of cloud federation which for has been offered approaches like identity federation, although it is not an optimum approach. There is needed a more effective, accurate and safe approach. This paper offered an approach to access control based on risk and trust parameters, depending on learning automata in cloud federation. Results of simulation shows that proposed approach prevents access of unauthorized user to the resources of federation by decreasing primary trust for novice user also by increasing risk for high sensitive resources.

References
  1. R. I. L. S. Foster I. , Yong Zhao," Cloud computing and grid computing 360-degree compared", In Grid Computing Environments Workshop, pages 1–10. GCE, Aug 2008.
  2. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. 2010," A view of cloud computing", Commun. ACM 53, 4 (2010), 50–58.
  3. Yisheng Wang, Haopeng Chen, "Dynamic resource arrangement in cloud federation," The 2012 IEEE Asia-Pacific Services Computing Conference(APSCC 2012), Pages: 50-57, Guilin, China, 2012. 12. 06-2012. 12. 08, ISBN: 978-1-4673-4825-6.
  4. T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai, and M. Kunze,"Cloud Federation", The Second International Conference on Cloud Computing, GRIDs, and Virtualization, September 2011, pp. 32-38.
  5. Abdul Raouf Khan," Access control in cloud computing enviroment", Department of Computer Sciences, King Faisal University, Saudi Arabia, MAY 2012.
  6. A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: interCloud identity management infrastructure", 19th IEEE WETICE, June 2010, pp. 263-265.
  7. B. Holmer, S. Rubby,"Federated identity management in interCloud ", Der Technischen Universita¨ tmu¨ nchen, 2013, pp. 3-9.
  8. Antonio Celesti, Francesco Tusa, Massimo Villari and Antonio Puliafito," Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication", Dept. of Mathematics, Faculty of Engineering, University of Messina Contrada di Dio, S. Agata, 98166 Messina, Italy. 2010.
  9. Xixu Fu,Kai jun Wu,XiZhang Gong," Access Control and Security in Cloud Computing Systems", Institute of Information Technology, Shanghai Ocean University, Shanghai, China,2009,4-12,pp. 69-89.
  10. Bassam Farroha, Deborah Farroha," Challenges of "Operationalizing" Static System Access Control: Transitioning from ABAC to RADAC", Bassam Farroha, Deborah Farroha, 2011.
  11. Daniel Ricardo dos Santos, Carla Merkle Westphall," Risk-based dynamic access control for a highly scalable cloud federation ", Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina Florianópolis, Brazil,2013, 40-63.
  12. R. McGraw, "Risk-adaptable access control RADAC, in: Privilege (Access) Management Workshop",NIST–National Institute of Standards and Technology–Information Technology Laboratory, 2009.
  13. L. Zhang, A. Brodsky, S. Jajodia, "Toward information sharing: Benefit and risk access control BARAC", in: Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, IEEE Computer Society, Washington, D-C, USA, 2006, pp. 45–53.
  14. P. -C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, A. S. Reninger," Fuzzy multi-level security: An experiment on quantified riskadaptive access control", in: IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA, USA, 2007, pp. 222–230.
  15. Q. Ni, E. Bertino, J. Lobo, "Risk-based access control systems built on fuzzy inferences", in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, ACM, New York, NY,USA, 2010, pp. 250–260.
  16. Kevin Kelly,"Role-Based Access Control Model", 1998, pp. 50-93.
  17. Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo," Dynamic risk-based decision methods for access control systems "Universit´e du Qu´ebec en Outaouais, Gatineau, Qu´ebec, Canada,2011.
  18. Q. Wang, H. Jin,"Quantified risk-adaptive access control for patient privacy protection in health information systems, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11), ACM, New York, NY, USA, 2011, pp. 406–410.
  19. M. Thathachar and P. Sastry, "Varieties of learning automata: An Overview", IEEE Transactions on Systems, Man and Cybernetics, vol. 32, no. 6, pp. 711-722, 2002.
  20. K. Najim and A. S. Poznyak, "Learning Automata: Theory and Application", Tarrytown, NY: Elsevier Science Ltd. , 1994.
  21. K. Narendra and M. A. L. Thathachar, "Learning automata: An Introduction", Prentice Hall, Englewood Cliffs, New Jersey, 1989.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computation Access Control Cloud Federation Learning Automata.