Skip to main content

A Novel Trust Based Access Control Model for Cloud Environment

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 395))

Abstract

Cloud computing is a service oriented technology which offers the services (IaaS, PaaS, and SaaS) as a utility over the Internet. Since cloud computing is one of the most popular form of Internet application, the resources and services in cloud environment is more vulnerable to security threats and attacks. In order to protect the cloud environment from malicious users, we proposed a novel trust based access control model. The proposed model authorize the user based on user trust value before entering to cloud environment. The user must be trusted before accessing the resources and the resources must be trusted before providing the services to the user. In this paper, we evaluate the trust value of both user and cloud resources. The user trust value is evaluated based on the user behaviour parameter and the resource trust value is evaluated based on the Service Level Agreement (SLA) parameter. If the trust value of both users and cloud resources are more than their threshold value then they are considered as trusted. We implement the proposed model using java and oracle as database server. The implementation result shows the trust value of different type of users and CSP and compare with the QoS model. The proposed model performs better than QoS model in terms of Rate of Successful Transaction (RST).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xiao, Zhifeng, and Yang Xiao. Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE 15, no. 2 (2013): 843–859.

    Google Scholar 

  2. S. K. Panda, P. K. Jana. Efficient task scheduling algorithms for heterogeneous multi-cloud environment. The Journal of Super Computing 71(4): 1505–1533 (2015).

    Google Scholar 

  3. Mell, Peter, and Tim Grance. The NIST definition of cloud computing. (2011).

    Google Scholar 

  4. Samarati, Pierangela, and Sabrina Capitani de Vimercati. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design, pp.137–196. Springer Berlin Heidelberg, 2001.

    Google Scholar 

  5. Younis, Younis A., Kashif Kifayat, and Madjid Merabti. An access control model for cloud computing. Journal of Information Security and Applications 19, no. 1 (2014): 45–60.

    Google Scholar 

  6. http://en.wikipedia.org/wiki/Mandatory-access-control.

  7. Samarati, Pierangela, and Sabrina De Capitani Di Vimercati. “Access control: Policies, models, and mechanisms.” Lecture notes in computer science (2001): 137–196.

    Google Scholar 

  8. Sandhu, Ravi S., Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. Computer 29, no. 2 (1996): 38–47.

    Google Scholar 

  9. Grandison, Tyrone, and Morris Sloman. A survey of trust in internet applications. Communications Surveys & Tutorials, IEEE 3, no. 4 (2000): 2–16.

    Google Scholar 

  10. Lin, Guoyuan, Danru Wang, Yuyu Bie, and Min Lei. MTBAC: A mutual trust based access control model in Cloud computing. Communications, China 11, no.4 (2014): 154–162.

    Google Scholar 

  11. Manuel, Paul. A trust model of cloud computing based on Quality of Service. Annals of Operations Research (2013): 1–12.

    Google Scholar 

  12. Gupta, P., Kumar Goyal, M., Kumar, P., & Aggarwal, A. (2013). Trust and reliability based scheduling algorithm for cloud IaaS. In Lecture notes in electrical engineering: Vol. 150. Proceedings of the third international conference on trends in information, telecommunication and computing (pp. 603607).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pratap Kumar Behera .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer India

About this paper

Cite this paper

Behera, P.K., Khilar, P.M. (2017). A Novel Trust Based Access Control Model for Cloud Environment. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_29

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-3592-7_29

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-3590-3

  • Online ISBN: 978-81-322-3592-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics