Consortium-Based Algorithm for Access Control and Pattern Analysis Models

Author:

Pardakhe Nilima V.1,Deshmukh Vaishali M.1

Affiliation:

1. Ram Meghe Institute of Technology & Research

Abstract

Abstract Inappropriate ownership transfers, weak access control, and incorrect authentication are just some of the most common external risks to public cloud installations. Cloud application developers may intentionally or unintentionally introduce these design-level issues. The difficulty that modern large-scale cloud deployments have in identifying and patching these vulnerabilities is a contributing factor to the decline in cloud QoS (quality of service) and the rise in overall system cost. Many different models of security patches have been developed by researchers and penetration testers in an effort to counteract this widespread issue. In this paper the Novel architecture is proposed that is applied to the header level to allow access to all data in incoming traffic. For the purpose of determining the most effective means of restricting access for possible internal and external attackers, this data is being processed by a context-aware rule-based engine. Moreover, it uses pattern analysis to assess the possibility of attacks like man-in-the-middle, cross-site scripting (XSS), SQL injection (SQLi), denial of service (DoS), and cross-site request forgery (CORS). By designing the network around the concept of a blockchain consortium, it is feasible to effectively exert ownership control without affecting the system's operation. This blockchain-based method stores all ownership requests in a private cloud until the content owner approves or rejects them, at which point they are transferred to the public cloud. These three properties of the model—distributed computing, immutability, and verifiability—are maintained by using a public/private chaining mechanism. The method has been evaluated across many cloud implementations, with consistent findings showing a 99.9% improvement in lowering the probability of external assaults while preserving or improving upon the efficiency of latency, throughput, and ownership transfer.

Publisher

Research Square Platform LLC

Reference39 articles.

1. Bhatt S, Patwa F, Sandhu R (2017), August Access control model for AWS internet of things. In International Conference on Network and System Security (pp. 721–736). Springer, Cham

2. BC-BLPM: a multi-level security access control model based on blockchain technology;Yu X;China Commun,2021

3. A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain;Toyoda K;IEEE access,2017

4. Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation;Yang X;IEEE Access,2020

5. Fabric-IoT: A blockchain-based access control system in IoT;Liu H;IEEE Access,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3