Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture

File Size:
1.22 MB
Volume 2, Issue 10 (October, 2016)
Publication No:
Jahangir Ahmad Dar, Mandeep Singh Saini
27 x

Cloud computing is a fast evolving and accepted concept that uses the distributed resources in a better way and can be allocated to users according to their requirements making it an efficient utilization of  provided resources  and  much more cheaper. Compared with any other existing technology, it is more flexible, cheaper, location independent, reliable and most importantly most available as long as the services are considered.   There is various access control strategies which cloud are positioned according to the requirement of the organization. Third Party Authentication  policy is a traditional role oriented access method while Risk based access control is a risk aware access control technique which access the demanding user after manipulative the trade-off between permitting access to an unauthorized access request and rejecting an access to an official user. It has a calculated value for every instance which is in the form of matrix that’s used while deciding the access permissions. In TPA, users get access to a particular resource depending on the role of that user in the group. The access control models are developed according to the security need of the society caring little about the effects sthey can food on the utilization of resources. As resource efficiency is one of the important aspects of cloud computing, it is very important to study the effects of access control policies on the supply utilization in cloud computing. No work has been done to study the effects of access control policies on the resource consumption in the cloud computing environment. In this paper, effect of the Third Party Authentication policy and risk based admission controller policy were evaluated on resource utilization in a cloud environment with the resource operation metrics of processor, RAM and system response time.

Cloud Computing, Third Party Authentication, AM, Network Response Time and Resource Utilization.