A symbolic attribute-based access control model for data security in the cloud

Bibliographic Details
Main Author: Oyeyinka, Iyabo Felicia
Publication Date: 2021
Other Authors: Idowu, Sunday, Kuyoro, Afolashade
Format: Article
Language: eng
Source: ITEGAM-JETIA
Download full: https://itegam-jetia.org/journal/index.php/jetia/article/view/750
Summary: There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists.
id ITEGAM_d9eb09f5454d32a06010e841d0cf7389
oai_identifier_str oai:ojs.itegam-jetia.org:article/750
network_acronym_str ITEGAM
network_name_str ITEGAM-JETIA
repository_id_str
spelling A symbolic attribute-based access control model for data security in the cloudUn modelo de control de acceso basado en atributos simbólicos para la seguridad de los datos en la nubeUm modelo de controle de acesso baseado em atributos simbólicos para segurança de dados na nuvemThere have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists.Se han realizado varios intentos en la literatura para desarrollar técnicas de control de acceso para detener los problemas de seguridad de los datos. Se ha descubierto que muchas de estas técnicas tienen una deficiencia u otra. Por lo tanto, este estudio desarrolló un sistema de control de acceso basado en atributos simbólicos (SABAC) para la seguridad de los datos en el entorno de servicios en la nube. El sistema SABAC se implementó mediante el desarrollo del algoritmo Hash-tag Symbol Authentication (HSA) utilizando el cifrado Message Digest-5. SABAC utiliza un método de autenticación continua de 3 niveles al combinar el uso de nombre de usuario y contraseña, código HSA y monitoreo y verificación de imágenes en tiempo real. El código HSA se genera combinando atributos de usuario de 5 tuplas y la cadena generada a partir de la imagen del usuario mediante la técnica de ofuscación. La cadena concatenada se convierte a hexadecimal que sirve como entrada a MD5 para producir un código HSA único. SABAC se evaluó utilizando tres métricas de seguridad principales de confidencialidad, integridad y disponibilidad. El resultado de las pruebas de métricas de seguridad mostró un nivel de confianza del 99,993%, un umbral de integridad del 99,998% y un rendimiento de disponibilidad de 150 usuarios / segundo. Esto implica que SABAC es altamente eficiente para la seguridad de los datos en la nube. Muestra que a los piratas informáticos les resultaría imposible hacer coincidir una identidad falsa con una HSA válida en la base de datos. El estudio concluyó que SABAC podría utilizarse para el control de acceso en un entorno de nube para garantizar la seguridad de los datos. Se recomendó que los proveedores de soluciones en la nube y los especialistas en seguridad adoptaran el sistema SABAC.Várias tentativas foram feitas na literatura para desenvolver técnicas de controle de acesso para conter problemas de segurança de dados. Muitas dessas técnicas tinham uma deficiência ou outra. Assim, este estudo desenvolveu um sistema de Controle de Acesso Baseado em Atributos Simbólicos (SABAC) para segurança de dados em ambiente de serviço em nuvem. O sistema SABAC foi implementado desenvolvendo o algoritmo Hash-tag Symbol Authentication (HSA) usando a criptografia Message Digest-5. O SABAC utiliza um método de autenticação contínua de 3 camadas combinando o uso de nome de usuário e senha, código HSA e monitoramento e verificação de imagem em tempo real. O código HSA é gerado combinando atributos de usuário de 5 tuplas e a string gerada a partir da imagem do usuário usando a técnica de ofuscação. A string concatenada é convertida em hexadecimal, que serve como entrada para MD5 para produzir um código HSA exclusivo. O SABAC foi avaliado usando três principais métricas de segurança de confidencialidade, integridade e disponibilidade. O resultado dos testes de métricas de segurança mostrou um nível de confiança de 99,993%, limite de integridade de 99,998% e taxa de transferência de disponibilidade de 150 usuários / segundo. Isso significa que o SABAC é altamente eficiente para segurança de dados em nuvem. Isso mostra que os hackers achariam impossível combinar qualquer identidade falsa com HSA válida no banco de dados. O estudo concluiu que o SABAC pode ser usado para controle de acesso em um ambiente de nuvem para garantir a segurança dos dados. Foi recomendado que o sistema SABAC fosse adotado por Provedores de Soluções em Nuvem e Especialistas em Segurança.ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia2021-06-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionPeer-reviewed Articleapplication/pdfhttps://itegam-jetia.org/journal/index.php/jetia/article/view/75010.5935/jetia.v7i29.750ITEGAM-JETIA; v.7 n.29 2021; 36-46ITEGAM-JETIA; v.7 n.29 2021; 36-46ITEGAM-JETIA; v.7 n.29 2021; 36-462447-022810.5935/jetia.v7i29reponame:ITEGAM-JETIAinstname:Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)instacron:ITEGAMenghttps://itegam-jetia.org/journal/index.php/jetia/article/view/750/493Oyeyinka, Iyabo FeliciaIdowu, SundayKuyoro, Afolashadeinfo:eu-repo/semantics/openAccess2021-07-01T00:13:54Zoai:ojs.itegam-jetia.org:article/750Revistahttps://itegam-jetia.org/journal/index.php/jetiaPRIhttps://itegam-jetia.org/journal/index.php/jetia/oaieditor@itegam-jetia.orgopendoar:2021-07-01T00:13:54ITEGAM-JETIA - Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)false
dc.title.none.fl_str_mv A symbolic attribute-based access control model for data security in the cloud
Un modelo de control de acceso basado en atributos simbólicos para la seguridad de los datos en la nube
Um modelo de controle de acesso baseado em atributos simbólicos para segurança de dados na nuvem
title A symbolic attribute-based access control model for data security in the cloud
spellingShingle A symbolic attribute-based access control model for data security in the cloud
Oyeyinka, Iyabo Felicia
title_short A symbolic attribute-based access control model for data security in the cloud
title_full A symbolic attribute-based access control model for data security in the cloud
title_fullStr A symbolic attribute-based access control model for data security in the cloud
title_full_unstemmed A symbolic attribute-based access control model for data security in the cloud
title_sort A symbolic attribute-based access control model for data security in the cloud
author Oyeyinka, Iyabo Felicia
author_facet Oyeyinka, Iyabo Felicia
Idowu, Sunday
Kuyoro, Afolashade
author_role author
author2 Idowu, Sunday
Kuyoro, Afolashade
author2_role author
author
dc.contributor.author.fl_str_mv Oyeyinka, Iyabo Felicia
Idowu, Sunday
Kuyoro, Afolashade
description There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists.
publishDate 2021
dc.date.none.fl_str_mv 2021-06-30
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://itegam-jetia.org/journal/index.php/jetia/article/view/750
10.5935/jetia.v7i29.750
url https://itegam-jetia.org/journal/index.php/jetia/article/view/750
identifier_str_mv 10.5935/jetia.v7i29.750
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://itegam-jetia.org/journal/index.php/jetia/article/view/750/493
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia
publisher.none.fl_str_mv ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia
dc.source.none.fl_str_mv ITEGAM-JETIA; v.7 n.29 2021; 36-46
ITEGAM-JETIA; v.7 n.29 2021; 36-46
ITEGAM-JETIA; v.7 n.29 2021; 36-46
2447-0228
10.5935/jetia.v7i29
reponame:ITEGAM-JETIA
instname:Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)
instacron:ITEGAM
instname_str Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)
instacron_str ITEGAM
institution ITEGAM
reponame_str ITEGAM-JETIA
collection ITEGAM-JETIA
repository.name.fl_str_mv ITEGAM-JETIA - Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)
repository.mail.fl_str_mv editor@itegam-jetia.org
_version_ 1837010818658467840