IDEAS home Printed from https://ideas.repec.org/a/spr/ijsaem/v14y2023i6d10.1007_s13198-023-02112-x.html
   My bibliography  Save this article

Provisioning trust-oriented role-based access control for maintaining data integrity in cloud

Author

Listed:
  • Urvashi Rahul Saxena

    (Jaypee Institute of Information Technology, Noida)

  • Taj Alam

    (Jaypee Institute of Information Technology, Noida)

Abstract

Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic period, particularly for data storage and pay-per-use services. Restricted and reliable access control is essential for protecting the data stored in the cloud. The traditional role-based access control techniques are ineffective in multi-tenant computing systems like the cloud. To provide security in cloud computing systems and offer a trusted environment for service providers and service users, we present a trust-oriented role-based access control paradigm in this work. The Trust Management System's reputation is something that TRBAC wants to uphold by ensuring that various cloud threats do not compromise the service requests made and used by individual users. Validation and analysis of the membership credentials of users and roles mapped in the access control list ensure restricted access control in TRBAC. The proposed model intends to assist the data owners in identifying reliable service users and service providers by reviewing the interaction history and assessing direct, indirect, and weighted trust. This paper demonstrates how calculated trust values detect nefarious nodes and recommend defense mechanisms against various security concerns, including the Sybil attack, the On–off attack, the Collusion attack, and the DoS attack. To illustrate the impact of the suggested mitigation techniques and to handle various security concerns, a comparative analysis of the TRBAC model is done with its peers.

Suggested Citation

  • Urvashi Rahul Saxena & Taj Alam, 2023. "Provisioning trust-oriented role-based access control for maintaining data integrity in cloud," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(6), pages 2559-2578, December.
  • Handle: RePEc:spr:ijsaem:v:14:y:2023:i:6:d:10.1007_s13198-023-02112-x
    DOI: 10.1007/s13198-023-02112-x
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s13198-023-02112-x
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s13198-023-02112-x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Urvashi Rahul Saxena & Taj Alam, 2023. "Role-based access using partial homomorphic encryption for securing cloud data," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 950-966, June.
    2. Saim Kashmiri & Cameron Duncan Nicol & Liwu Hsu, 2017. "Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR," Journal of the Academy of Marketing Science, Springer, vol. 45(2), pages 208-228, March.
    3. Xu Jing & Zhengnan Liu & Shuqin Li & Bin Qiao & Gexu Tan, 2017. "A cloud-user behavior assessment based dynamic access control model," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(3), pages 1966-1975, November.
    4. Marta Meisner, 2017. "Financial Consequences Of Cyber Attacks Leading To Data Breaches In Healthcare Sector," Copernican Journal of Finance & Accounting, Uniwersytet Mikolaja Kopernika, vol. 6(3), pages 63-73.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Nan Zhang & Heng Xu, 2024. "Fairness of Ratemaking for Catastrophe Insurance: Lessons from Machine Learning," Information Systems Research, INFORMS, vol. 35(2), pages 469-488, June.
    2. Steffen Runge & Christian Schwens & Matthias Schulz, 2022. "The invention performance implications of coopetition: How technological, geographical, and product market overlaps shape learning and competitive tension in R&D alliances," Strategic Management Journal, Wiley Blackwell, vol. 43(2), pages 266-294, February.
    3. Zhang, Yimei & Smith, Thomas, 2023. "The impact of customer firm data breaches on the audit fees of their suppliers," International Journal of Accounting Information Systems, Elsevier, vol. 50(C).
    4. Wu, Zhenshu & Pownall, Rachel & Shih, Yi-Cheng & Wang, Yao, 2024. "Industry effects of corporate environmental and social scandals: Evidence from China," International Review of Financial Analysis, Elsevier, vol. 95(PC).
    5. Sylvie Héroux & Anne Fortin, 2020. "Cybersecurity Disclosure by the Companies on the S&P/TSX 60 Index," Accounting Perspectives, John Wiley & Sons, vol. 19(2), pages 73-100, June.
    6. Kimberly A. Whitler & Ali Besharat & Saim Kashmiri, 2021. "Exogenous brand crises: brand infection and contamination," Marketing Letters, Springer, vol. 32(1), pages 129-133, March.
    7. Manis, K.T. & Madhavaram, Sreedhar, 2023. "AI-Enabled marketing capabilities and the hierarchy of capabilities: Conceptualization, proposition development, and research avenues," Journal of Business Research, Elsevier, vol. 157(C).
    8. Nan Zhou & Heli Wang, 0. "Foreign subsidiary CSR as a buffer against parent firm reputation risk," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 0, pages 1-27.
    9. Ali Besharat & Kimberly A. Whitler & Saim Kashmiri, 2024. "When CEO Pay Becomes a Brand Problem," Journal of Business Ethics, Springer, vol. 190(4), pages 941-973, April.
    10. Dalia Hussein Elsayed & Tariq H. Ismail & Eman Adel Ahmed, 2024. "The impact of cybersecurity disclosure on banks’ performance: the moderating role of corporate governance in the MENA region," Future Business Journal, Springer, vol. 10(1), pages 1-15, December.
    11. Nan Zhou & Heli Wang, 2020. "Foreign subsidiary CSR as a buffer against parent firm reputation risk," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 51(8), pages 1256-1282, October.
    12. Edeling, Alexander & Srinivasan, Shuba & Hanssens, Dominique M., 2021. "The marketing–finance interface: A new integrative review of metrics, methods, and findings and an agenda for future research," International Journal of Research in Marketing, Elsevier, vol. 38(4), pages 857-876.
    13. Rajiv Kashyap & Mohamed Menisy & Peter Caiazzo & Jim Samuel, 2020. "Transparency versus Performance in Financial Markets: The Role of CSR Communications," Papers 2008.03443, arXiv.org.
    14. Chi Zhang & Saim Kashmiri & Melissa Cinelli, 2019. "How Does Brand Age Influence Consumer Attitudes Toward a Firm’s Unethical Behavior?," Journal of Business Ethics, Springer, vol. 158(3), pages 699-711, September.
    15. Confente, Ilenia & Siciliano, Giorgia Giusi & Gaudenzi, Barbara & Eickhoff, Matthias, 2019. "Effects of data breaches from user-generated content: A corporate reputation analysis," European Management Journal, Elsevier, vol. 37(4), pages 492-504.
    16. Feng, Cong & Fay, Scott, 2020. "Store Closings and Retailer Profitability: A Contingency Perspective," Journal of Retailing, Elsevier, vol. 96(3), pages 411-433.
    17. Rong Liu & Jiawei Yang & Jifei Wu, 2022. "When Big Data Backfires: The Impact of a Perceived Privacy Breach by Pharmaceutical E-Retailers on Customer Boycott Intention in China," IJERPH, MDPI, vol. 19(8), pages 1-13, April.
    18. Abhi Bhattacharya, 2023. "Consumer, bank, and stock market reaction to CFPB’s complaint data disclosure," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 28(1), pages 128-145, March.
    19. Fang, Xiang & Wang, Xiaoyu & Shao, Yingying & Banerjee, Pramit, 2024. "Examining the effect of a firm’s product recall on financial values of its competitors," Journal of Business Research, Elsevier, vol. 176(C).
    20. Uddin, Mohammad Rajib & Akter, Shahriar & Lee, Wai Jin Thomas, 2024. "Developing a data breach protection capability framework in retailing," International Journal of Production Economics, Elsevier, vol. 271(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:14:y:2023:i:6:d:10.1007_s13198-023-02112-x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.