Design and Development of Honey Bee Behavior Excited Modern Quality Constructed Entry Controller using Bell-Lapadula Paradigm in Cloud Computing Methodology
Citation
MLA Style :Dr. S. Ravichandran, R. Benjohnson, K. Ramanathan "Design and Development of Honey Bee Behavior Excited Modern Quality Constructed Entry Controller using Bell-Lapadula Paradigm in Cloud Computing Methodology" International Journal of Recent Engineering Science 7.2(2020):1-7.
APA Style :Dr. S. Ravichandran, R. Benjohnson, K. Ramanathan. Design and Development of Honey Bee Behavior Excited Modern Quality Constructed Entry Controller using Bell-Lapadula Paradigm in Cloud Computing Methodology International Journal of Recent Engineering Science, 7(2),1-7.
Abstract
Distributed computing is one of the rising advances that is being utilized broadly nowadays. It utilizes the registering assets, for example, equipment and programming that is conveyed over the web and offers remote types of assistance with client’s information, programming, and calculation. There has been a developing pattern to utilize the cloud for an enormous scope of information stockpiling. This has raised the significant security issue of how to control and forestall unapproved access to information put away in the cloud. There are different access control methods in cloud conditions, for example, IBAC, RBAC, ABAC, MAC, and DAC. Among these systems, Attribute-Based Access Control (ABAC) is increasing more significance. Here access is allowed dependent on characteristics. Our essential goal is to condense all the entrance control strategies in cloud condition. Our principal objective is to thought of a Novel Attribute-Based Access Control for cloud security utilizing Enhanced Bell-Lapadula Model propelled from Honey Bee behavior. The Honey Bee keeps the interlopers from going into their hives. This is like the entrance control system in cloud condition. It distinguishes the honey bee with a place with a similar hive by the ownership of the little points on the stings. So also, we are attempting to limit the clients dependent on the ownership of the right arrangement of traits by utilizing the ABAC strategy.
Reference
[1] SankyunYun,(2012)“AnEfficientTCAM basedImplementation ofMultipatternMatching usingCovered StateEncoding” IEEETransactionson Computers,Vol.61, No.2,Pg.213.
[2] D.Sahithi, Dr. Harini,(2012) “Enhanced HierarchicalMultipatternMatching Algorithm for deep packet Inspection” International Journal of Computer ScienceandInformation Technology&Security, Vol.2, No.3, Pg.524.
[3] AnatBremler-Barr and YaronKoral, (2011)“AcceleratingMultiPatternMatching on CompressedHTTP Traffic”, InternationalConference,Pg.01, BlavatnikSchoolofComputer SciencesTel-Aviv University,Israel.
[4] ChengHungLin,ShihChiehChan(2011) “AnEfficient PatternMatching Algorithm ForMemory Architecture”,IEEE Transactions onVeryLargeScale Integration.Vol.19,No.1.
[5] Po-Ching Lin, Y in g -Dar Lina n d Yu a n - ChengLai,(2011)“AHybridAlgorithm of BackwardHashingandAutomatonTracking for virus scanning”, IEEE international Conference, TaiwanUniversity,Computer Science,Vol.60,No.4,Pg.33.
[6] Raravi, Gurulingesh, Sharma, Neera, Ramamritham, Krithi, and Malewar, Sachitanand (2006). “Efficient real-time support for automotive applications: A case study. In Proceedings of the 12th IEEE International Conference on RTCSA, pages 335-341.
[7] R. A. Chowdhury, et al., “Oblivious algorithms for multicores and network of processors,” in Parallel & Distributed Processing (IPDPS), 2010 IEEE International Symposium on, 2010, pp. 1-12.
[8] G. M. Amdahl, “Validity of the single processor approach to achieving large scale computing capabilities,” presented at the Proceedings of the April 18-20, 1967, spring joint computer conference, Atlantic City, New Jersey, 1967.
[9] Aggarwal and S. V. Jeffrey, “The input/output complexity of sorting and related problems,” Commun. ACM, vol. 31, pp. 1116- 1127, 1988.
[10] Uno, A. Sakaguchi, T. and Tsugawa, S. (1999). “A merging control algorithm based on inter-vehicle communication”. In IEEE International Conference on Intelligent Transportation Systems, pages 783-787
[11] M.Sharada Varalakshmi, "An Introduction to Multilevel Security in Cyber Physical System" SSRG International Journal of Computer Science and Engineering 4.7 (2017): 26-29.
Keywords
Attribute Based Access Control, BellLapadula Model, and Cloud security