A symbolic attribute-based access control model for data security in the cloud
| Main Author: | |
|---|---|
| Publication Date: | 2021 |
| Other Authors: | , |
| Format: | Article |
| Language: | eng |
| Source: | ITEGAM-JETIA |
| Download full: | https://itegam-jetia.org/journal/index.php/jetia/article/view/750 |
Summary: | There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists. |
| id |
ITEGAM_d9eb09f5454d32a06010e841d0cf7389 |
|---|---|
| oai_identifier_str |
oai:ojs.itegam-jetia.org:article/750 |
| network_acronym_str |
ITEGAM |
| network_name_str |
ITEGAM-JETIA |
| repository_id_str |
|
| spelling |
A symbolic attribute-based access control model for data security in the cloudUn modelo de control de acceso basado en atributos simbólicos para la seguridad de los datos en la nubeUm modelo de controle de acesso baseado em atributos simbólicos para segurança de dados na nuvemThere have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists.Se han realizado varios intentos en la literatura para desarrollar técnicas de control de acceso para detener los problemas de seguridad de los datos. Se ha descubierto que muchas de estas técnicas tienen una deficiencia u otra. Por lo tanto, este estudio desarrolló un sistema de control de acceso basado en atributos simbólicos (SABAC) para la seguridad de los datos en el entorno de servicios en la nube. El sistema SABAC se implementó mediante el desarrollo del algoritmo Hash-tag Symbol Authentication (HSA) utilizando el cifrado Message Digest-5. SABAC utiliza un método de autenticación continua de 3 niveles al combinar el uso de nombre de usuario y contraseña, código HSA y monitoreo y verificación de imágenes en tiempo real. El código HSA se genera combinando atributos de usuario de 5 tuplas y la cadena generada a partir de la imagen del usuario mediante la técnica de ofuscación. La cadena concatenada se convierte a hexadecimal que sirve como entrada a MD5 para producir un código HSA único. SABAC se evaluó utilizando tres métricas de seguridad principales de confidencialidad, integridad y disponibilidad. El resultado de las pruebas de métricas de seguridad mostró un nivel de confianza del 99,993%, un umbral de integridad del 99,998% y un rendimiento de disponibilidad de 150 usuarios / segundo. Esto implica que SABAC es altamente eficiente para la seguridad de los datos en la nube. Muestra que a los piratas informáticos les resultaría imposible hacer coincidir una identidad falsa con una HSA válida en la base de datos. El estudio concluyó que SABAC podría utilizarse para el control de acceso en un entorno de nube para garantizar la seguridad de los datos. Se recomendó que los proveedores de soluciones en la nube y los especialistas en seguridad adoptaran el sistema SABAC.Várias tentativas foram feitas na literatura para desenvolver técnicas de controle de acesso para conter problemas de segurança de dados. Muitas dessas técnicas tinham uma deficiência ou outra. Assim, este estudo desenvolveu um sistema de Controle de Acesso Baseado em Atributos Simbólicos (SABAC) para segurança de dados em ambiente de serviço em nuvem. O sistema SABAC foi implementado desenvolvendo o algoritmo Hash-tag Symbol Authentication (HSA) usando a criptografia Message Digest-5. O SABAC utiliza um método de autenticação contínua de 3 camadas combinando o uso de nome de usuário e senha, código HSA e monitoramento e verificação de imagem em tempo real. O código HSA é gerado combinando atributos de usuário de 5 tuplas e a string gerada a partir da imagem do usuário usando a técnica de ofuscação. A string concatenada é convertida em hexadecimal, que serve como entrada para MD5 para produzir um código HSA exclusivo. O SABAC foi avaliado usando três principais métricas de segurança de confidencialidade, integridade e disponibilidade. O resultado dos testes de métricas de segurança mostrou um nível de confiança de 99,993%, limite de integridade de 99,998% e taxa de transferência de disponibilidade de 150 usuários / segundo. Isso significa que o SABAC é altamente eficiente para segurança de dados em nuvem. Isso mostra que os hackers achariam impossível combinar qualquer identidade falsa com HSA válida no banco de dados. O estudo concluiu que o SABAC pode ser usado para controle de acesso em um ambiente de nuvem para garantir a segurança dos dados. Foi recomendado que o sistema SABAC fosse adotado por Provedores de Soluções em Nuvem e Especialistas em Segurança.ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia2021-06-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionPeer-reviewed Articleapplication/pdfhttps://itegam-jetia.org/journal/index.php/jetia/article/view/75010.5935/jetia.v7i29.750ITEGAM-JETIA; v.7 n.29 2021; 36-46ITEGAM-JETIA; v.7 n.29 2021; 36-46ITEGAM-JETIA; v.7 n.29 2021; 36-462447-022810.5935/jetia.v7i29reponame:ITEGAM-JETIAinstname:Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)instacron:ITEGAMenghttps://itegam-jetia.org/journal/index.php/jetia/article/view/750/493Oyeyinka, Iyabo FeliciaIdowu, SundayKuyoro, Afolashadeinfo:eu-repo/semantics/openAccess2021-07-01T00:13:54Zoai:ojs.itegam-jetia.org:article/750Revistahttps://itegam-jetia.org/journal/index.php/jetiaPRIhttps://itegam-jetia.org/journal/index.php/jetia/oaieditor@itegam-jetia.orgopendoar:2021-07-01T00:13:54ITEGAM-JETIA - Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM)false |
| dc.title.none.fl_str_mv |
A symbolic attribute-based access control model for data security in the cloud Un modelo de control de acceso basado en atributos simbólicos para la seguridad de los datos en la nube Um modelo de controle de acesso baseado em atributos simbólicos para segurança de dados na nuvem |
| title |
A symbolic attribute-based access control model for data security in the cloud |
| spellingShingle |
A symbolic attribute-based access control model for data security in the cloud Oyeyinka, Iyabo Felicia |
| title_short |
A symbolic attribute-based access control model for data security in the cloud |
| title_full |
A symbolic attribute-based access control model for data security in the cloud |
| title_fullStr |
A symbolic attribute-based access control model for data security in the cloud |
| title_full_unstemmed |
A symbolic attribute-based access control model for data security in the cloud |
| title_sort |
A symbolic attribute-based access control model for data security in the cloud |
| author |
Oyeyinka, Iyabo Felicia |
| author_facet |
Oyeyinka, Iyabo Felicia Idowu, Sunday Kuyoro, Afolashade |
| author_role |
author |
| author2 |
Idowu, Sunday Kuyoro, Afolashade |
| author2_role |
author author |
| dc.contributor.author.fl_str_mv |
Oyeyinka, Iyabo Felicia Idowu, Sunday Kuyoro, Afolashade |
| description |
There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other. Hence, this study developed a Symbolic Attribute-Based Access Control (SABAC) system for data security in the cloud service environment. SABAC system was implemented by developing Hash-tag Symbol Authentication (HSA) algorithm using the Message Digest-5 encryption. SABAC utilizes a 3-Tier continuous authentication method by combining the use of username and password, HSA code, and real-time image monitoring and verification. HSA code is generated by combining 5-tuple user attributes and the string generated from the user’s image using Obfuscation Technique. The concatenated string is converted to hexadecimal which serves as input to MD5 to produces a unique HSA code. SABAC was evaluated using three major security metrics of confidentiality, integrity, and avail-ability. The result of security metrics tests showed a confidence level of 99.993%, integrity threshold of 99.998%, and availability throughput of 150 users/second. This implies that SABAC is highly efficient for cloud data security. It shows that hackers would find it impossible to match any fake identity with valid HSA in the database. The study concluded that SABAC could be used for access control in a cloud environment for assuring data security. It was recommended that the SABAC system should be adopted by Cloud Solution Providers and Security Specialists. |
| publishDate |
2021 |
| dc.date.none.fl_str_mv |
2021-06-30 |
| dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Peer-reviewed Article |
| format |
article |
| status_str |
publishedVersion |
| dc.identifier.uri.fl_str_mv |
https://itegam-jetia.org/journal/index.php/jetia/article/view/750 10.5935/jetia.v7i29.750 |
| url |
https://itegam-jetia.org/journal/index.php/jetia/article/view/750 |
| identifier_str_mv |
10.5935/jetia.v7i29.750 |
| dc.language.iso.fl_str_mv |
eng |
| language |
eng |
| dc.relation.none.fl_str_mv |
https://itegam-jetia.org/journal/index.php/jetia/article/view/750/493 |
| dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
| eu_rights_str_mv |
openAccess |
| dc.format.none.fl_str_mv |
application/pdf |
| dc.publisher.none.fl_str_mv |
ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia |
| publisher.none.fl_str_mv |
ITEGAM - Instituto de Tecnologia e Educação Galileo da Amazônia |
| dc.source.none.fl_str_mv |
ITEGAM-JETIA; v.7 n.29 2021; 36-46 ITEGAM-JETIA; v.7 n.29 2021; 36-46 ITEGAM-JETIA; v.7 n.29 2021; 36-46 2447-0228 10.5935/jetia.v7i29 reponame:ITEGAM-JETIA instname:Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM) instacron:ITEGAM |
| instname_str |
Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM) |
| instacron_str |
ITEGAM |
| institution |
ITEGAM |
| reponame_str |
ITEGAM-JETIA |
| collection |
ITEGAM-JETIA |
| repository.name.fl_str_mv |
ITEGAM-JETIA - Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM) |
| repository.mail.fl_str_mv |
editor@itegam-jetia.org |
| _version_ |
1837010818658467840 |