Open Access

ARTICLE

Fuzzy User Access Trust Model for Cloud Access Control

Aakib Jawed Khan*, Shabana Mehfuz
Department of Electrical Engineering, Jamia Millia Islamia, New Delhi, 110025, India
* Corresponding Author: Aakib Jawed Khan. Email:

Computer Systems Science and Engineering 2023, 44(1), 113-128. https://doi.org/10.32604/csse.2023.023378

Received 06 September 2021; Accepted 29 November 2021; Issue published 01 June 2022

Abstract

Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs and service providers face a huge challenge to ensure the security and integrity of both network and data. To overcome these challenges access control mechanisms are employed. Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data. For ensuring data integrity on cloud platforms, access control mechanisms should go beyond authentication, identification, and authorization. Thus, in this work, a trust-based access control mechanism is proposed that analyzes the data of the user behavior, network behavior, demand behavior, and security behavior for computing trust value before granting user access. The method that computes the final trust value makes use of the fuzzy logic algorithm. The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.

Keywords

Cloud architecture; fuzzy logic; trust-based access mechanism

Cite This Article

A. Jawed Khan and S. Mehfuz, "Fuzzy user access trust model for cloud access control," Computer Systems Science and Engineering, vol. 44, no.1, pp. 113–128, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 579

    View

  • 249

    Download

  • 0

    Like

Share Link

WeChat scan