Resolving rule redundancy error in ABA C policies using individual domain and subset detection method | IEEE Conference Publication | IEEE Xplore

Resolving rule redundancy error in ABA C policies using individual domain and subset detection method

Publisher: IEEE

Abstract:

Access control models play an important role in the security mechanism. The intrusion detection and prevention system implements the access control models to identify whe...View more

Abstract:

Access control models play an important role in the security mechanism. The intrusion detection and prevention system implements the access control models to identify whether authorized or illegal access. The access control model has a set of policies where each policy consists of a set of rules. The role of the access control model is to decide whether allow or deny the access request based on the security rules. The attribute-based access control model (ABAC) is the promising model than the other access control model due to its flexibility and efficiency. The anomalies or errors in the ABAC security rules or policies cause serious security issues. Thus policy validation is an important task and is usually done in the cluster of rules instead of validating every rule to reduce the time and complexity of the task. Rule redundancy is one of the policy errors thus one rule is a subset of one or more rules. Despite all anomalies are validated by verifying every cluster of rules, rule redundancy error can be solved before clustering or at the time of clustering. This results in reducing the size of each cluster and leads to better policy validation of rule redundancy and other errors. This paper proposed an approach to detect and resolve the rule redundancy error at the time of clustering. We used individual domains for each attribute of rules to avoid the heterogeneous data sets and to found the proper and accurate subset of rules. This work will help the researchers in implementing efficient policy validation and access control models.
Date of Conference: 08-10 July 2021
Date Added to IEEE Xplore: 02 August 2021
ISBN Information:
Publisher: IEEE
Conference Location: Coimbatre, India
No metrics found for this document.

I. Introduction

Cloud computing is an emerging technology and it provides the platform for providing and hosting many services for the users through the help of the internet. The cloud technology delivers many attractive services to the resource owners and business people that they can do their business without tension and spending much in managing the infrastructure of their demand. Thus they can avail of any shared resource when it is required for their business (on a demand basis) [1]. Despite cloud computing delivers several services with the help of well-developed network technology and the internet, the sharing of data and resources in the network technology causes various critical security issues such as malicious intruders, data breaches, and data loss [2]. The cloud service providers implement the security system to resolve all the security issues. But still, there is a big challenge in implementing a proper and efficient security model. One of the biggest problems is protecting the data stored in the cloud. Despite the outsourced data are stored (encrypted data) after doing the encryption process, the data leaking and attack by the malicious intruders is really a big challenge for the researchers in developing a security model to overcome all these issues [3]. Cloud computing is a growing, needful and promising technology for sharing computing services over the internet on a demand basis. Resource or data protection and security are the most obstacles in this paradigm. The well-growing and glamorous network technology with the life partner of speedy internet encourages the users for online data sharing. Facebook, Instagram, WhatsApp, and Twitter are the social networks give hug and attractive platform for sharing users' data. The cloud service providers encrypting data or use an access control model to data from leaking and unauthorized intruders [4].

Usage
Select a Year
2024

View as

Total usage sinceAug 2021:75
01234JanFebMarAprMayJunJulAugSepOctNovDec210300020000
Year Total:8
Data is updated monthly. Usage includes PDF downloads and HTML views.

References

References is not available for this document.