NOVEL SECURITY MODEL USING DUAL SECURITY AND USER ROLES

Authors

  • Sukesh, Bhardwaj School of Computer Science & System Studies, Career Point University, Alaniya, Jhalawar Road, Kota-325003, Rajasthan, India Author
  • Surendra, Yadav School of Computer Science & System Studies, Career Point University, Alaniya, Jhalawar Road, Kota-325003, Rajasthan, India Author

DOI:

https://doi.org/10.61841/ekf7m797

Keywords:

Role Based Security, User authentication, Dual Security

Abstract

Each and every organization has to manage users for the efficient functioning of the organization. Organizations have data that makes a relationship between users. In such an environment, data security is a major issue. For this type of issue, this paper proposes the dual security model involving the concept of using biometrics and pictures. The concept of authentication used is not only interactive but also secure and dynamic. It works together with the dual security, role assignment, and role-based access on the primary basis of the security model. The security analysis of the model using the online tools found the model to be very effective and promising. 

Downloads

Download data is not yet available.

References

[1] M. Afshar, S. Samet, and T. Hu, “An attribute-based access control framework for healthcare systems,” J. Phy. Conf. Ser. vol. 933, 2018, p. 012020.

[2] S. Chakraborty, R. Sandhu, and R. Krishnan, “On the feasibility of attribute-based access control policy mining,” in IEEE 20th Int. Conf. Inf. Reuse Integrat. Data Sci. (IRI), July 2019, pp. 245-252.

[3] R. Vidhate and V. D. Shinde, “Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI,” Int. J. Multidisciplinary Res. Develop., vol. 2, pp. 20-27, 2015.

[4] T. Phillips, X. Yu, B. Haakenson, and X. Zou, "Design and Implementation of Privacy-Preserving, Flexible, and Scalable Role-Based Hierarchical Access Control," IEEE Int. Conf. Trust, Priv. Secu. Intel. Sys. App., pp. 46-55, 2019.

[5] Y. Xue, K. Xue, N. Gai, J. Hong, D. S. Wei, and P. Hong, “An attribute-based controlled collaborative access control scheme for public cloud storage,” IEEE Tran. Inf. Forens. Security, vol. 14, pp. 2927-2942, 2019.

[6] Y. Xu, W. Gao, Q. Zeng, G. Wang, J. Ren, and Y. Zhang, “A feasible fuzzy-extended attribute-based access control technique,” Sec. Comm. Net., 2018.

[7] C. Hahn, H. Kwon, and J. Hur, "Trustworthy Delegation Toward Securing Mobile Healthcare CyberPhysical Systems," IEEE Internet Things J., vol. 6, pp. 6301-6309, 2019.

[8] G. V. Bandewar and R. H. Borhade, "Role-Based Encryption with Efficient Access Control in Cloud Storage,” Int. J. Sci. Res. (IJSR), 2016.

[9] N. Geetha and M. S. Anbarasi, “Role and attribute-based access control model for web service composition in a cloud environment,” in IEEE Int. Conf. Computat. Intelligenc. Data Sci. (ICCIDS), June 2017, pp. 1-4.

[10] F. Yue-Qin and Z. Yong-Sheng, “Trusted Access Control Model Based on Role and Task in Cloud Computing,” in 7th Int Conf. Inf. Tech. Med. Educ. (ITME), Nov. 2015, pp. 710-713.

[11] A. Wójtowicz and K. Joachimiak, “Model for adaptable context-based biometric authentication for mobile devices,” Per. Ubiquit. Comput., vol. 20, pp. 195-207, 2016.

[12] W. C. Garrison, A. Shull, S. Myers, and A. J. Lee, "On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud," IEEE Sym. Sec. Priv., pp. 819-838, 2016.

[13] Y. Wang, Y. Ma, K. Xiang, Z. Liu, and M. Li, “A Role-Based Access Control System Using Attribute-Based Encryption,” in IEEE Int. Conf. Big Data Artific. Intellig. (BDAI), June 2018, pp. 128-133.

[14] I., Ray, and I. Ray, “Trust-based access control for secure cloud computing,” in High Perform. Cloud Audit. Applicat., Springer, NY, pp. 189-213, 2014.

Downloads

Published

30.04.2020

How to Cite

Bhardwaj, S., & Yadav, S. (2020). NOVEL SECURITY MODEL USING DUAL SECURITY AND USER ROLES. International Journal of Psychosocial Rehabilitation, 24(2), 5449-5458. https://doi.org/10.61841/ekf7m797