Open Access   Article Go Back

Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic

J. Persis Jessintha1 , R. Anbuselvi2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 49-53, Mar-2018

Online published on Mar 31, 2018

Copyright © J. Persis Jessintha, R. Anbuselvi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Persis Jessintha, R. Anbuselvi, “Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.49-53, 2018.

MLA Style Citation: J. Persis Jessintha, R. Anbuselvi "Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic." International Journal of Computer Sciences and Engineering 06.02 (2018): 49-53.

APA Style Citation: J. Persis Jessintha, R. Anbuselvi, (2018). Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic. International Journal of Computer Sciences and Engineering, 06(02), 49-53.

BibTex Style Citation:
@article{Jessintha_2018,
author = {J. Persis Jessintha, R. Anbuselvi},
title = {Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {49-53},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=204},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=204
TI - Time Window Based Frequency Analysis for Efficient Access Control in Cloud Using Fuzzy Logic
T2 - International Journal of Computer Sciences and Engineering
AU - J. Persis Jessintha, R. Anbuselvi
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 49-53
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

To improve the performance of access control in cloud environment, different approaches has been discussed earlier. Towards the problem of access restriction, an efficient trust based access control mechanism is presented in this paper. The method maintains the access details of various services of different users in different time window. The time window access logs has various information about the service access and their status of completion. Using the log available, the method estimates the frequency of services being accessed. Also with the status of the services access, the method computes the trust factor. The frequency measures has been computed for different time window for each service. Based on the value of frequency measures, the method generates fuzzy rules. Based on the fuzzy rules generated, the trust factor has been estimated for any user. The method produces efficient results in access restriction and reduces the time complexity as well.

Key-Words / Index Term

Cloud Environment, Access Control, Fuzzy Rules, Frequency Analysis, Time Orient Approach

References

[1]. Wei Teng ; Geng Yang Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing, IEEE Transactions on Cloud Computing ( Volume: PP, Issue: 99 ), Page(s): 1 – 1, 2015.
[2]. Jun Luo, A Novel Role-based Access Control Model in Cloud Environments, Journal International Journal of Computational Intelligence Systems Volume 9, 2016 - Issue 1, 2016.
[3]. Lixia Xie and Chong Wang, Cloud Multidomain Access Control Model Based on Role and Trust-Degree, Hindawi, Journal of Electrical and Computer Engineering Volume 2016 (2016).
[4]. Kan Yang, Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach, IEEE Transactions on Multimedia, Vol 18, Issue: 5, May 2016.
[5]. Jongkil Kim, Surya Nepal, A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage, Data Science and Engineering , Volume 1, Issue 3, pp 149–160, 2016.
[6]. Mehdi Sookhaka,, F. Richard Yua, Attribute-based data access control in mobile cloud computing: Taxonomy and open issues, Elsevier, Future Generation Computer Systems 72 (2017) 273–287.
[7]. B.Srinivasa Rao, A Framework for Predicate Based Access Control Policies in Infrastructure as a Service Cloud, Int. Journal of Engineering Research and Applications, Vol. 6, Issue 2, (Part -6) February 2016, pp.36-44.
[8]. Nicolai Paladi, Providing User Security Guarantees in Public Infrastructure Clouds, IEEE Transaction on Cloud Computing, Vol. 5, Issue 3, 2017.
[9]. Jesus Luna, Quantitative Reasoning about Cloud Security Using Service Level Agreements, IEEE Transaction on Cloud Computing, Vol. 3, Issue 5, 2017.
[10]. Zheng Yan, Flexible Data Access Control Based on Trust and Reputation in Cloud Computing, IEEE Transaction on cloud computing, Vol.5 Issue 3, 2017.
[11]. Kei Fan, Privacy protection based access control scheme in cloud-based services, IEEE Transaction on China Communications, vol. 14, Issue 3, 2017.
[12]. Sakshi kathuria, "A Survey on Security Provided by Multi-Clouds in Cloud Computing", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[13]. Zhirong zen, Keyword Search With Access Control Over Encrypted Cloud Data, IEEE Transaction on sensor journal , vol 17, issue 3, 2017.
[14]. Jianghong Wei , Secure and Efficient Attribute-Based Access Control for Multi-authority Cloud Storage, IEEE System Journal vol. issue 99, 2017.
[15]. Jin Li, Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing, Cloud Computing Technology and Science (Cloud-Com), 2010.
[16]. J.Persis Jessintha and Dr.R.Anbuselvi,” Aggrandizing Authorization By Enhancing Trust Using Fuzzy Logic In Cloud Environment”, International Journal of Applied Engineering Research, 10, 538-542, 2015.