Proceedings ArticleDOI
A Honey Bee behaviour inspired novel Attribute-based access control using enhanced Bell-Lapadula model in cloud computing
B Balamurugan,N Gnana Shivitha,V Monisha,V Saranya +3 more
- pp 1-6
TLDR
This work aims to come up with a Novel Attribute-Based Access Control for cloud security using Enhanced Bell-Lapadula Model inspired from Honey Bee behaviour to summarize all the access control techniques in cloud environment.Abstract:
Cloud computing is one of the emerging technologies that is being used widely these days. It makes use of the computing resources such as hardware and software that is delivered over the internet and provides remote services with user's data, software and computation. There has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. There are various access control techniques in cloud environment such as IBAC, RBAC, ABAC, MAC, DAC. Among these techniques, Attribute-Based Access Control (ABAC) is gaining more importance. Here access is granted based on attributes. Our primary objective is to summarize all the access control techniques in cloud environment. Our main objective is to come up with a Novel Attribute-Based Access Control for cloud security using Enhanced Bell-Lapadula Model inspired from Honey Bee behaviour. The Honey Bee prevents the intruders from entering into their hives. This is similar to the access control mechanism in cloud environment. It identifies the bee that belongs to the same hive by the possession of the small barbs on the stings. Similarly, we are trying to restrict the users based on the possession of correct set of attributes by using ABAC technique.read more
Citations
More filters
Journal ArticleDOI
Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model
Randhir Kumar,Rakesh Tripathi +1 more
TL;DR: This work proposes an enhanced Bell–LaPadula model and categorized the peers and transactions in different clearance and security levels and constructed a dynamic access control policies using a smart contracts to provide data security in the network.
Journal Article
Analysis of Security Models Based on Multilevel Security Policy
TL;DR: This paper introduces three information security models based on multilevel security policy Bell-La Padula (BLP) model, Biba model and Clark-Wilson model and emphatically expounds and compares the characteristics of the three models.
Journal ArticleDOI
Modeling of enterprise management structure for data leakage evaluation
Laima Kauspadiene,Simona Ramanauskaite,Antanas Čenys,Justinas Janulevičius,Justinas Rastenis +4 more
TL;DR: An Enterprise Management Structure (EMS) model for information flow data leakage probability estimation is proposed and it is concluded that its results meet expert evaluation tendencies and correlate with Bell-LaPadula confidentiality model.
Proceedings ArticleDOI
An improved blp model with response blind area eliminated
TL;DR: An improved Bell-LaPadula model combining with obligation mechanism is proposed and response mechanism is also introduced in the improved model which can resolve the disadvantage of response blind area.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book
Role-based access control
TL;DR: This newly revised edition of the Artech House bestseller, Role-Based Access Control, offers the very latest details on this sophisticated security model aimed at reducing the cost and complexity of security administration for large networked applications.
Journal ArticleDOI
Honey bee behavior inspired load balancing of tasks in cloud computing environments
TL;DR: An algorithm named honey bee behavior inspired load balancing (HBB-LB) is proposed, which aims to achieve well balanced load across virtual machines for maximizing the throughput and compared with existing load balancing and scheduling algorithms.