NOVEL SECURITY MODEL USING DUAL SECURITY AND USER ROLES
DOI:
https://doi.org/10.61841/ekf7m797Keywords:
Role Based Security, User authentication, Dual SecurityAbstract
Each and every organization has to manage users for the efficient functioning of the organization. Organizations have data that makes a relationship between users. In such an environment, data security is a major issue. For this type of issue, this paper proposes the dual security model involving the concept of using biometrics and pictures. The concept of authentication used is not only interactive but also secure and dynamic. It works together with the dual security, role assignment, and role-based access on the primary basis of the security model. The security analysis of the model using the online tools found the model to be very effective and promising.
Downloads
References
[1] M. Afshar, S. Samet, and T. Hu, “An attribute-based access control framework for healthcare systems,” J. Phy. Conf. Ser. vol. 933, 2018, p. 012020.
[2] S. Chakraborty, R. Sandhu, and R. Krishnan, “On the feasibility of attribute-based access control policy mining,” in IEEE 20th Int. Conf. Inf. Reuse Integrat. Data Sci. (IRI), July 2019, pp. 245-252.
[3] R. Vidhate and V. D. Shinde, “Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI,” Int. J. Multidisciplinary Res. Develop., vol. 2, pp. 20-27, 2015.
[4] T. Phillips, X. Yu, B. Haakenson, and X. Zou, "Design and Implementation of Privacy-Preserving, Flexible, and Scalable Role-Based Hierarchical Access Control," IEEE Int. Conf. Trust, Priv. Secu. Intel. Sys. App., pp. 46-55, 2019.
[5] Y. Xue, K. Xue, N. Gai, J. Hong, D. S. Wei, and P. Hong, “An attribute-based controlled collaborative access control scheme for public cloud storage,” IEEE Tran. Inf. Forens. Security, vol. 14, pp. 2927-2942, 2019.
[6] Y. Xu, W. Gao, Q. Zeng, G. Wang, J. Ren, and Y. Zhang, “A feasible fuzzy-extended attribute-based access control technique,” Sec. Comm. Net., 2018.
[7] C. Hahn, H. Kwon, and J. Hur, "Trustworthy Delegation Toward Securing Mobile Healthcare CyberPhysical Systems," IEEE Internet Things J., vol. 6, pp. 6301-6309, 2019.
[8] G. V. Bandewar and R. H. Borhade, "Role-Based Encryption with Efficient Access Control in Cloud Storage,” Int. J. Sci. Res. (IJSR), 2016.
[9] N. Geetha and M. S. Anbarasi, “Role and attribute-based access control model for web service composition in a cloud environment,” in IEEE Int. Conf. Computat. Intelligenc. Data Sci. (ICCIDS), June 2017, pp. 1-4.
[10] F. Yue-Qin and Z. Yong-Sheng, “Trusted Access Control Model Based on Role and Task in Cloud Computing,” in 7th Int Conf. Inf. Tech. Med. Educ. (ITME), Nov. 2015, pp. 710-713.
[11] A. Wójtowicz and K. Joachimiak, “Model for adaptable context-based biometric authentication for mobile devices,” Per. Ubiquit. Comput., vol. 20, pp. 195-207, 2016.
[12] W. C. Garrison, A. Shull, S. Myers, and A. J. Lee, "On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud," IEEE Sym. Sec. Priv., pp. 819-838, 2016.
[13] Y. Wang, Y. Ma, K. Xiang, Z. Liu, and M. Li, “A Role-Based Access Control System Using Attribute-Based Encryption,” in IEEE Int. Conf. Big Data Artific. Intellig. (BDAI), June 2018, pp. 128-133.
[14] I., Ray, and I. Ray, “Trust-based access control for secure cloud computing,” in High Perform. Cloud Audit. Applicat., Springer, NY, pp. 189-213, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.