Advertisement

Trust-Based Access Control in Cloud Computing Using Machine Learning

  • Pabitr Mohan KhilarEmail author
  • Vijay Chaudhari
  • Rakesh Ranjan Swain
Chapter
Part of the Studies in Big Data book series (SBD, volume 49)

Abstract

Cloud computing is a distributed computing environment which hosts dedicated computing resources accessed anytime from anywhere. This brings many advantages such as flexibility of data access, data omnipresence, and elasticity [1, 2, 3, 4, 5, 6, 7]. As there is no control of data owner over the data, this brings security threats. Providing a secure cloud environment from the malicious user is one of the important and challenging tasks among scientific and business user community. Over the time, various control access models have been proposed for secure access in the cloud environment such as cryptographic-based access model, identity-based access control model and trust-based access control model. The users and cloud resources should be trusted before accessing the cloud. It is observed that the existing access control models mainly overlook the user behavior and scalability of the trust management system. We have considered the trust-based approach which provides access to the user in the cloud by their trust value computed based on the past accesses and behavior. We consider important parameters such as user behavior, bogus request, unauthorized request, forbidden request and specification of range. We proposed a trust evaluation strategy based on the machine learning approach predicting the trust values of user and resources. The machine learning techniques such as K-Nearest neighbor, decision tree, logistic regression and naive Bays are considered as the important strategies to evaluate the trust management system in our proposed work. We implemented our proposed machine learning method in jupyter notebook simulator tool. We found better result in terms of efficiency, prediction time and error rate which is presented in the result section of this chapter.

Keywords

Cloud computing Machine learning Access control Cryptography based access model 

References

  1. 1.
    Tianfield, H.: Cloud computing architectures. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1394–1399 (2011)Google Scholar
  2. 2.
    Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA). IEEE, pp. 27–33 (2010)Google Scholar
  3. 3.
    Krutz, R. L., Vines, R. D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing (2010)Google Scholar
  4. 4.
    Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshops (ICPPW). IEEE, pp. 275–279 (2010)Google Scholar
  5. 5.
    Jamshidi, P., Ahmad, A., Pahl, C.: Cloud migration research: a systematic review. IEEE Trans. Cloud. Comp. 1(2), 142–157 (2013)CrossRefGoogle Scholar
  6. 6.
    Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)CrossRefGoogle Scholar
  7. 7.
    Ristenpart, T., Tromer, E., Shacham, H., Savage, S: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199–212. ACM (2009)Google Scholar
  8. 8.
    Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-sale: surviving organized ddos attacks that mimic flash crowds. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2, pp. 287–300. USENIX Association (2005)Google Scholar
  9. 9.
    Yaar, A., Perrig, A., Song, D: Fit: fast internet traceback. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol. 2. IEEE, pp. 1395–1406 (2005)Google Scholar
  10. 10.
    Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, p. 9. ACM (2008)Google Scholar
  11. 11.
    Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: Proceedings IEEE INFOCOM 2011, pp. 820–828. IEEE (2011)Google Scholar
  12. 12.
    Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. In: Optimizing Information Security and Advancing Privacy Assurance: New Technologies, vol. 150 (2012)Google Scholar
  13. 13.
    Takabi, H., Joshi, J.B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  14. 14.
    Bai, Q.-h., Zheng, Y.: Study on the access control model. In: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, vol. 1, pp. 830–834. IEEE (2011)Google Scholar
  15. 15.
    Langaliya, C., Aluvalu, R.: Enhancing cloud security through access control models: a survey. Intern. J. Comp. Appl. 112(7) (2015)Google Scholar
  16. 16.
    Jaeger, T., Prakash, A.: Implementation of a discretionary access control model for script-based systems. In: Proceedings of Eighth IEEE Computer Security Foundations Workshop, 1995, pp. 70–84. IEEE (1995)Google Scholar
  17. 17.
    Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)CrossRefGoogle Scholar
  18. 18.
    Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel. Distrib. Syst. 22(7), 1214–1221 (2011)CrossRefGoogle Scholar
  19. 19.
    Lin, G., Wang, D., Bie, Y., Lei, M.: Mtbac: a mutual trust based access control model in cloud computing. China. Commun. 11(4), 154–162 (2014)CrossRefGoogle Scholar
  20. 20.
    Gholami, A., Arani, M.G.: A trust model based on quality of service in cloud computing environment. Intern. J. Data. Theory. Appl. 8(5), 161–170 (2015)Google Scholar
  21. 21.
    Mell, P., Grance, T., et al.: The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf (2011)
  22. 22.
    Behera, P.K., Khilar, P.M: A novel trust based access control model for cloud environment. In: Proceedings of the International Conference on Signal, Networks, Computing, and Systems, pp. 285–295. Springer (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Pabitr Mohan Khilar
    • 1
    Email author
  • Vijay Chaudhari
    • 1
  • Rakesh Ranjan Swain
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology RourkelaRourkelaIndia

Personalised recommendations