scispace - formally typeset
Proceedings ArticleDOI

A Honey Bee behaviour inspired novel Attribute-based access control using enhanced Bell-Lapadula model in cloud computing

TLDR
This work aims to come up with a Novel Attribute-Based Access Control for cloud security using Enhanced Bell-Lapadula Model inspired from Honey Bee behaviour to summarize all the access control techniques in cloud environment.
Abstract
Cloud computing is one of the emerging technologies that is being used widely these days. It makes use of the computing resources such as hardware and software that is delivered over the internet and provides remote services with user's data, software and computation. There has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. There are various access control techniques in cloud environment such as IBAC, RBAC, ABAC, MAC, DAC. Among these techniques, Attribute-Based Access Control (ABAC) is gaining more importance. Here access is granted based on attributes. Our primary objective is to summarize all the access control techniques in cloud environment. Our main objective is to come up with a Novel Attribute-Based Access Control for cloud security using Enhanced Bell-Lapadula Model inspired from Honey Bee behaviour. The Honey Bee prevents the intruders from entering into their hives. This is similar to the access control mechanism in cloud environment. It identifies the bee that belongs to the same hive by the possession of the small barbs on the stings. Similarly, we are trying to restrict the users based on the possession of correct set of attributes by using ABAC technique.

read more

Citations
More filters
Journal ArticleDOI

Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model

TL;DR: This work proposes an enhanced Bell–LaPadula model and categorized the peers and transactions in different clearance and security levels and constructed a dynamic access control policies using a smart contracts to provide data security in the network.
Journal Article

Analysis of Security Models Based on Multilevel Security Policy

TL;DR: This paper introduces three information security models based on multilevel security policy Bell-La Padula (BLP) model, Biba model and Clark-Wilson model and emphatically expounds and compares the characteristics of the three models.
Journal ArticleDOI

Modeling of enterprise management structure for data leakage evaluation

TL;DR: An Enterprise Management Structure (EMS) model for information flow data leakage probability estimation is proposed and it is concluded that its results meet expert evaluation tendencies and correlate with Bell-LaPadula confidentiality model.
Proceedings ArticleDOI

An improved blp model with response blind area eliminated

TL;DR: An improved Bell-LaPadula model combining with obligation mechanism is proposed and response mechanism is also introduced in the improved model which can resolve the disadvantage of response blind area.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book

Role-based access control

TL;DR: This newly revised edition of the Artech House bestseller, Role-Based Access Control, offers the very latest details on this sophisticated security model aimed at reducing the cost and complexity of security administration for large networked applications.
Journal ArticleDOI

Honey bee behavior inspired load balancing of tasks in cloud computing environments

TL;DR: An algorithm named honey bee behavior inspired load balancing (HBB-LB) is proposed, which aims to achieve well balanced load across virtual machines for maximizing the throughput and compared with existing load balancing and scheduling algorithms.
Related Papers (5)