A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud
Abstract: Cloud computing is a widespread technology, which has attracted much attention nowadays. Among the many criteria that must be considered for data storage in the cloud, access control plays a vital role. Role-based access control (RBAC) is a well-known technique for secure data storage in the cloud. Since the traditional RBAC models are improper for open and decentralized environments, recently, some works have integrated the trust concept into the RBAC model. Nevertheless, they have not fully addressed the required security metrics of a trust-based system. Therefore, in this paper, we first introduce the security goals that should be considered in an efficient trust based system. Second, we propose a novel trust and reputation based RBAC model that not only can properly withstand the security threats of trust-based RBAC models, but also is scalable as it has reasonable execution time. Third, we evaluate the proposed model using the famous trust network of advocate dataset. Eventually, we compare the proposed model with recently-published ones in terms of mean absolute error, execution time of indirect trust computation, and provided features. The achieved results are indicative of the priority of the proposed model to be employed in real cloud environments.
Existing system: Among the existing access control policies, role-based access control (RBAC) has taken much attention from scholars. The main simple notion of the RBAC is that in an enterprise, permissions are first associated with functional roles and then, users are assigned to appropriate role or set of roles. Although the hard security mechanisms, such as RBAC, can deliver a fairly acceptable level of security, they are not quite suitable for open and decentralized environments like the cloud. Therefore, in order to enhance security in such environments, we need to also employ soft security mechanisms such as trust management. In other words, by utilization of trust and reputation based systems, a foundation for security, efficiency, and stability will be provided in the cloud environments . Since the existing trust and reputation based RBAC models are not accurate in trust computation, they cannot entirely cover the security threats. Proposed system: Although several trust models have been proposed during the recent years to be used in the context of the cloud, presenting an efficient model that can fully assuage the desired security requirements is still a challenging task. In 2011, Tan et al. proposed a dynamic trust-based RBAC model for the cloud computing environment. Nevertheless, careful assessment of their work indicates that it cannot totally ful fil the desired security metrics. In 2012, Barsoum and Hasan presented a storage scheme for cloud with four important features. One of these features is that their scheme enables mutual trust between an owner and the cloud service provider. In 2013, Li and Du proposed an adaptive trust model called “Cloud-Trust” in order to evaluate the competence of a cloud service. Using the “Cloud-Trust,” users can choose a better service provider in terms of trustworthiness. In 2014, a mutual trust-based access control model called “MTBAC” presented by Lin et al. This takes into account both the users’ behavior trust and the credibility of the cloud service node. At the same year, Zhu et al. Proposed “ATRCM,” an authenticated trust and reputation based calculation and management system that can be used for the integration of the cloud computing and wireless sensor networks. In, according to services of a cloud service provider and sensor network provider, trust and reputation are calculated.
Advantages: Resources from everywhere without being worried about storage space, cost, or resource management. Furthermore, cloud computing provides services that are cost effective, scalable, and elastic. Nonetheless, despite the many advantages that the cloud computing offers, security concerns have prevented its wide adoption. Moreover, in the evaluation and analysis section, we have compared our proposed indirect trust model with the related ones in terms of the mean absolute error factor and time complexity. Eventually, we have shown the advantages of our proposed model in comparison to the previous works from the security and trust computation accuracy perspectives. The results of these evaluations prove that our model is quite proper to be employed in real cloud environments. Expressing the criteria that need to be addressed in an efficient reputation and trust based system. Presenting an illustrative figure for each security metric/goal for its better comprehension. Proposing a novel holistic trust and reputation based RBAC model for secure data storage in the cloud, which can thoroughly fulfill the desired security requirements? Has a proper level of efficiency, and can be employed effectively in open environments like the cloud. Proposing a reliable architecture for trust-based RBAC model in the cloud. Disadvantages: The rest of this paper is organized as the following sections. In section II, we review the related works. In section III, the problem statement is presented in a comprehensive manner. Our proposed trust and reputation based RBAC model is delineated in section IV. In most applications, some parts of TMSs are dependent to the people’s way of thinking. Since people’s opinions and inferences about the trust are different, in such circumstances, TMSs encounter a problem called “subjectivity problem.” That is to say, in most cases, people’s evaluations, judgments, or behaviors are influenced by their personal beliefs, feelings, and emotions that are not precise to be considered as trust criteria.
Modules: Subjectivity Problem: In most applications, some parts of TMSs are dependent to the people’s way of thinking. Since people’s opinions and inferences about the trust are different, in such circumstances, TMSs encounter a problem called “subjectivity problem.” That is to say, in most cases, people’s evaluations, judgments, or behaviors are influenced by their personal beliefs, feelings, and emotions that are not precise to be considered as trust criteria. Therefore, it is clear that any system that is dependent to these criteria cannot be precise. The differences of people in terms of metrics, manners, or even emotional conditions cause the disposition of TMSs to trust diversity. In a simple interpretation, the disposition to trust diversity is a measure that represents how much a person is optimistic in dealing with trust issues. This measure is different from person to person and depends on people’s Experiences, inclination to trust, and psychological conditions. Therefore, in order to compute an accurate indirect trust about an entity, a recommended should somehow conform recommenders’ trust to his/her own way of thinking. In Fig. 4, we have depicted this problem in order to have a better understanding.
Indirect Trust (Recommendation Trust): In some scenarios, where there are not enough evidences or experiences to compute the direct trust about SUs, an SP needs to evaluate indirect trust. The indirect trust or recommendation trust is an SP’s trust to an SU through receiving recommendations of the other SPs that have had an interaction history with that SU. The recommender importance, subjectivity problem, and collusion are prominent issues that should be taken into account in an indirect trust evaluation. In order to cover these matters, some important factors should be applied in the indirect trust evaluation. A weight function based on transaction numbers , which a recommender has had with the trusted SU, is needed. This factor includes the recommender’s importance based on the interactions experience of the recommender about the SU. Another significant factor that needs to be used is forgetting factor, Δ . The forgetting factor is a parameter to apply the effect of
passage of time to the computed weight, which is in interval illustrates the effect of applying the forgetting factor.
0, 1 . Fig. 9
Subjectivity Problem Solution: As we described earlier in the problem statement section, trust is a subjective concept. People’s opinions and their way of thinking affect the accuracy of the indirect trust evaluation. Thus, an SP needs to somehow modify other SPs’ functional trust about an intended SU and make it in accordance with its own perspective. Some previous researches presented solutions to eliminate the subjectivity problem from the trust propagation. We have adopted some parts of the presented solution in to remove the subjectivity problem from our proposed indirect trust model. The presented solution does not consider trust feedbacks as an absolute value but a relative quantity for estimating other SPs’ tendency to trust. In Other words, we report the relative standing of the recommender SP’s trust in the target SU in terms of the trust value assignments that the recommender SP has made in the past. A simple implementation of this idea is to report trust as a percentile. A percentile value indicates the recommender SP’s perception of the target SU in relation to the others that the recommender SP has rated in the past. Collusion Attack Solution: A TMS will be ineffective if more than 50% of the people of society are malicious. Therefore, there is no practical remedy for this kind of societies. From the above brief description, we assume that the number of malicious entities in our RBAC model is less than 50%. As mentioned earlier, the collusion attack is another risk that threatens the accuracy of the indirect trust model. This security threat will be deteriorated if the number of malicious recommenders is more than normal. Consider the scenario that three malicious SPs make positive recommendations to a trustee so that a malicious SU is trusted. In this sense, the trust value of that malicious SU increases to the utmost, which is unreasonable. A practical solution to mitigate the risk of this attack is to include the minimum recommender numbers that should participate in the indirect trust computation. When the number of trustee recommenders that has had a transaction with corresponding
‖
are less than , where is a predefined threshold ‖ , the RBAC system will automatically append ‖ virtual recommenders to the indirect trust computation process.
‖