This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science and Engineering
Author
Kandala Saikiran, M. S. V. Sashi Kumar
Org/Univ
Vasavi College of Engineering, Hyderabad, Telangana, India
Pub. Date
03 June, 2019
Paper ID
V5I3-1668
Publisher
Keywords
PERMIS, SAAF, OpenStack, RBAC, MAPE-K, Self Adaptive Systems, Insider threats

Citationsacebook

IEEE
Kandala Saikiran, M. S. V. Sashi Kumar. An adaptive authorization in OpenStack cloud platform using MAPE-K, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Kandala Saikiran, M. S. V. Sashi Kumar (2019). An adaptive authorization in OpenStack cloud platform using MAPE-K. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.

MLA
Kandala Saikiran, M. S. V. Sashi Kumar. "An adaptive authorization in OpenStack cloud platform using MAPE-K." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.

Abstract

In recent years, Cloud computing has been receiving great attention from various business and research organizations as it promises to provide large storage facilities and highly managed remote Services. However, at the same time, it faces many technical challenges like privacy, reliability, security, etc. Insider threat is one of the most critical security threats for any Industry. Many researchers have been done and are being carried out in the field of cybersecurity for malicious insider attacks. Thus, the first element of such an attack is the internal user. Self-adaptive systems have shown to be able to provide an appropriate solution to treat these problems due to their efficiency and effectiveness. PERMIS role-based authorization infrastructure along with its conceptual authorization, access control, and trust models. It supports history-based decision making but PERMIS does not provide any authentication mechanism but leaves it up to the application to determine what to use. Applying SAAF to OpenStack would require considerable refactoring because OpenStack components that are responsible for dealing with authorization issues based on the Role Based Access Control (RBAC) model. OpenStack Keystone is quite different from that of PERMIS, The applicability of the proposed architecture is exemplified by means of possible responses to the insider threats scenarios. Responses are captured and incorporated into the MAPEK controller of the proposed architecture. The responses may have a different level of impact over the user, the role, or the service being accessed. It is possible that some of the responses may disrupt access to legitimate users whilst removing access to insider threats.