Reference Hub3
Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application

Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application

Auxilia M., Raja K., Kannan K.
Copyright: © 2020 |Volume: 9 |Issue: 1 |Pages: 18
ISSN: 2160-9772|EISSN: 2160-9799|EISBN13: 9781799807933|DOI: 10.4018/IJSDA.2020010104
Cite Article Cite Article

MLA

Auxilia M., et al. "Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application." IJSDA vol.9, no.1 2020: pp.63-80. http://doi.org/10.4018/IJSDA.2020010104

APA

Auxilia M., Raja K., & Kannan K. (2020). Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application. International Journal of System Dynamics Applications (IJSDA), 9(1), 63-80. http://doi.org/10.4018/IJSDA.2020010104

Chicago

Auxilia M., Raja K., and Kannan K. "Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application," International Journal of System Dynamics Applications (IJSDA) 9, no.1: 63-80. http://doi.org/10.4018/IJSDA.2020010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the evolution of social networks and big data, secure information sharing is a crucial task. When information is shared between the user and the organization admin, security plays a key role in any business organization in terms of privacy. Though many fruitful solutions prevail to protect the data integrity and privacy, there is a huge space for novel data protection schemes where a large set of data are involved. In this article, the Cloud-Based Access Control (C-BAC) framework is proposed which can fit in any business organization application. In this C-BAC, Policy Enforcement Point (PEP) is used to avoid unwanted information sharing with the neighboring employee. C-BAC framework with RSA provides security, based on the number of employees with the data handled by the particular employee, better than the existing access control framework with asymmetric encryption standard (AES) and Rivest–Shamir–Adleman (RSA) in terms of individual information handling.