Vijayalakshmi, K. and Jayalakshmi, V. (2021) A Priority-based Approach for Detection of Anomalies in ABAC Policies using Clustering Technique. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). pp. 897-903.
![[thumbnail of 1354.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
1354.pdf
Download (167kB)
Abstract
Cloud computing offers several computing
services like storage, networks, hardware, and software. The
most beneficial cloud service is cloud storage. The organization or large industries can store their big data in cloud storage on pay for usage scheme. As the big data are outsourced in a distributed cloud environment, securing and protecting the big data is essential. The various access control models, which consist of a set of security policies, are used generally to protect the outsourced data. Anomalies in the security policies dilute the efficiency of the access security model. Developing an efficient
access control model to protect the data is a challenging and ongoing process. The primary goal of this paper is to analyze and detect the important anomalies in Attribute-Based Access Control-ABAC Policies. This paper presents an approach that uses Priority-level to avoid the conflict in ABAC Policies. This approach groups the rules of ABAC policies based on Priority- level and similarity with the clustering technique, and detect the anomalies in each cluster rather than all rules, which made this approach efficient.
Item Type: | Article |
---|---|
Subjects: | Computer Science > Operating System |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 14 Sep 2024 07:03 |
Last Modified: | 14 Sep 2024 07:03 |
URI: | https://ir.vistas.ac.in/id/eprint/6039 |