{"title":"CACS—Compliant Access Control Scheme for Populated Cloud User Services","authors":"M. Pajany, G. Zayaraz","doi":"10.1109/ICSCAN53069.2021.9526503","DOIUrl":null,"url":null,"abstract":"Cloud resources provide ubiquitous service access for the connected users and applications through heterogeneous infrastructures. Being an open platform and permitting anywhere any time access, the resource security requirements are high. This article introduces a Compliant Access Control Scheme (CACS) for retaining the robustness of resource security amid condensed user requests. The proposed scheme ensures flexible access control using proportionate authentication. In this proportionate authentication, the access interval and the users' request density are accounted for granting resource permissions. This authentication requires identity verified shared keys for providing access to the resources. The scheme's performance is verified using access grant time, false rate, and service ratio.","PeriodicalId":393569,"journal":{"name":"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN53069.2021.9526503","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cloud resources provide ubiquitous service access for the connected users and applications through heterogeneous infrastructures. Being an open platform and permitting anywhere any time access, the resource security requirements are high. This article introduces a Compliant Access Control Scheme (CACS) for retaining the robustness of resource security amid condensed user requests. The proposed scheme ensures flexible access control using proportionate authentication. In this proportionate authentication, the access interval and the users' request density are accounted for granting resource permissions. This authentication requires identity verified shared keys for providing access to the resources. The scheme's performance is verified using access grant time, false rate, and service ratio.