Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/354304
Title: Ontology Based Access Control By Exploiting Subsumption Property To Protect Data Leakage In Cloud Environment
Researcher: Auxilia,M
Guide(s): Sheela Rani,B
Keywords: Computer Science
Computer Science Artificial Intelligence
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: Cloud computing has been in business organizations as well as end-users thereby minimizing administration effort, least maintenance cost, and ubiquitous access to any resource through the Internet. Sensitive information may persist in the cloud and rigid access control must be deployed to protect the data. Traditional Access control models such as Discretionary Access control (DAC), Mandatory Access Control model (MAC), Role-Based Access Model (RBAC), or Attribute-Based Access Control Model (ABAC) contemplate the elements of access control such as subject, object, and action in isolation and thereby driving to inappropriate access control conclusions. Here, ABAC is extended by incorporating the ontologies framework. Ontologies are used to model the subject, object and action, and the interrelationships between the entities. Hence the ontology-based access control could be adapted in cloud environments with ease. Ontology is chosen as it promises simplified information sharing among the entities in heterogeneous environments. Subsumption attribute is used over the cogitations, attributes, and personals which makes our contribution to stand unique among others. In the literature, subsumption property is used only among concepts. Subsumption property does not enforce storing all the policies explicitly, which in turn reduces the regulations to be preserved in the policy base. Hence, the size of the policy base does not hamper the performance of the proposed model and the target policy can be easily achieved. Subsumption property also helps the newline newline newline newlineinference engine to do reasoning in a shorter span thereby the proposed model can make faster access control decisions. newline newline newlineFurthermore, the proposed work is evaluated with the assistance of access control criteria facilitated by the National Institute of Standards and Technology (NIST) and compared with the models suggested by many researchers in the literature. The criterion like the simplicity of benefit tasks, least bene
Pagination: A5
URI: http://hdl.handle.net/10603/354304
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
01. title.pdfAttached File197.15 kBAdobe PDFView/Open
02. certificate.pdf839.87 kBAdobe PDFView/Open
03. acknowledgement.pdf21.79 kBAdobe PDFView/Open
04. abstract.pdf19.43 kBAdobe PDFView/Open
05. table of contents.pdf1.23 MBAdobe PDFView/Open
06. chapter 1.pdf6.15 MBAdobe PDFView/Open
06. chapter 2.pdf4.73 MBAdobe PDFView/Open
06. chapter 3.pdf11.16 MBAdobe PDFView/Open
06. chapter 4.pdf4.57 MBAdobe PDFView/Open
06. chapter 5.pdf5.16 MBAdobe PDFView/Open
07. conclusion.pdf485.22 kBAdobe PDFView/Open
08. references.pdf4.31 MBAdobe PDFView/Open
09. curriculam vitae.pdf176.73 kBAdobe PDFView/Open
10. evaluation reports.pdf3.89 MBAdobe PDFView/Open
80_recommendation.pdf197.15 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: