Cloud computing is considered as the one of the most dominant paradigm in field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Promising all these services as it is, this cloud computing paradigm still associates number of challenges such as data security, abuse of cloud services, malicious insider and cyber-attacks. Among all these security requirements of cloud computing access control is the one of the fundamental requirement in order to avoid unauthorized access to a system and organizational assets. Main purpose of this research is to review the existing methods of cloud access control models and their variants pros and cons and to identify further related research directions for developing an improved access control model for public cloud data storage. We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models. As the outcome of the study we have come up with an improved access control model with hybrid cryptographic schema and hybrid cloud architecture and practical implementation of it. We have tested our model for security implications, performance, functionality and data integrity to prove the validity. We have used AES and RSA cryptographic algorithms to implement the cryptographic schema and used public and private cloud to enforce our access control security and reliability.By validating and testing we have proved that our model can withstand against most of the cyber attacks in real cloud environment. Hence it has improved capabilities compared with other previous access control models that we have reviewed through literature.
翻译:云计算模式被视为信息技术领域最主要的模式之一,它根据需求提供了成本效益高的服务,如服务软件(SAAS)、服务基础设施(IAAS)和平台(PAAS)等软件(PAAS)。 改善所有这些服务,这种云计算模式仍然与数据安全、滥用云服务、恶意内幕和网络攻击等挑战数目相关。云计算访问控制的所有安全要求都是避免未经授权进入系统和组织资产的基本要求之一。这项研究的主要目的是审查云访问控制模式的现有方法及其变异的利弊,并查明进一步的相关研究方向,以开发更好的公共云数据存储访问控制模式。我们提出了详细的云计算访问控制需求分析,并找出了重要差距,而传统的访问控制模式并未满足这些差距。我们研究的结果是改进了访问控制模式,以避免未经授权进入系统和组织资产。我们测试了安全影响、性业绩、功能和数据完整性的模型,以比较了网络访问能力。我们使用了系统安全访问系统测试系统,从而证明了我们的安全访问和数据安全控制系统的有效性。