You are on page 1of 6

International Journal of Intelligent Networks 4 (2023) 62–67

Contents lists available at ScienceDirect

International Journal of Intelligent Networks


journal homepage: www.keaipublishing.com/en/journals/
international-journal-of-intelligent-networks

Enhance cloud security and effectiveness using improved RSA-based RBAC


with XACML technique
A. Kousalya a, Nam-kyun Baik b, *
a
Department of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore, India
b
Dept. of Cyber Security, College of Science and Technology, Duksung Women’s University, 33, Samyang-ro 144-gil, Dobong-gu, Seoul, Republic of Korea

A R T I C L E I N F O A B S T R A C T

Keywords: In the current era, numerous products are accessible online from anywhere and every minute. This work used
Cloud computing encryption with access management because authenticities, anonymity, and security over accessibility are
Cryptography mandatory. The proposed design introduced a significantly better encryption strategy to ensure better protection
Privacy
of overall resource admissions. This proposed work uses Improved RSA-based role-based access control (RBAC)
Admission control
Security
with extendable access connectivity markup language (XACML) to encrypt information and maintain privileges.
This approach enables storing information within the online computer using cryptographic ideas and information
available via a basic admission management mechanism. To ensure the overall protection of sensitive infor­
mation, the encryption method is employed that merged the conventional homogeneous encryption procedure
with unstable information distribution method. This hybrid technique provides user to get advantage from
retrieved information in a protected manner. The overall execution of proposed work is considerably quicker
than other existing encryption methods.

1. Introduction administered by enterprise or another company. The global internet [2]


makes computer resources available throughout entire community.It is
The web technology allows clients to access information easily at any controlled and maintained by internet operator that represents another
location through the World Wide Web. Internet allows clients to get second party.A collaborative network is 2nd cloud distribution model, in
information but need technology like equipment setup for adminis­ which numerous companies with parallel goal as protection needs, to
trator. Through internet, ubiquitous computing allows users worldwide work together on shared resources.In business concept, This hybrid
to tie with any collective number of sources such as communications, cloud merge three and multiple internet architectures through standards
computers, programs,etc. Utilizing cloud computing services, supplier and private technologies that achieve information mobility.
offers benefit to users by same memory, networks, control processing, Fog computing, commercial internet and Personal computing are
and other computational capabilities. Each customer used application normally3 system approach that droplet solution can be divided into.
practically that runs on a computer operating platform [1].The cloud Especially within any huge business market sector, Commercial internet
signature concept involves storing the private key and performing the is distributed an operational settings from public computers between
data signing encryption process directly on the server. For secure use of people [3].A commercial infrastructure is maintained and monitored by
cloud signature, it is necessary to solve the problem of strong client a single firm. The hybrid architecture has distinct mechanism that in­
authentication when accessing its private key and the problem of tegrates other platforms such as commercial, communal, and corporate
securely storing the private key on the server. An example of such a databases.This hybrid communal architecture is applied through
solution is CryptoPro TSS, which supports Rutoken Web (Strong numerous firms, at any certain area and also made possible communal
Two-Factor Authentication) as one of its authentication options, and information. Government or Private Corporations is supporting this
uses an HSM to store the private key. infrastructure. In internet technology, existing access technique is
A personal computing offers virtual droplet platform that is being guaranteed that unwanted persons also enter into the network. This
entirely used by firm and its unique usage. The technology is technique avoided illegitimate changes by individuals who have own

* Corresponding author.
E-mail addresses: kousalyaa@skcet.ac.in (A. Kousalya), namkyun@duksung.ac.kr (N.-k. Baik).

https://doi.org/10.1016/j.ijin.2023.03.003
Received 26 August 2022; Received in revised form 18 March 2023; Accepted 19 March 2023
Available online 21 March 2023
2666-6030/© 2023 Published by Elsevier B.V. on behalf of KeAi Communications Co., Ltd. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
A. Kousalya and N.-k. Baik International Journal of Intelligent Networks 4 (2023) 62–67

access to the network. Connectivity achieved with difficulties including within Hadoop terminal that engaged location which has other site
privacy issues. here are also improvements that provide support for rights.Smart Infrastructure network use privilege concept that depend
crypto algorithms. Some time ago, full-featured browsers with support on location for responsibility withing eological segment. Therefore,
for encryption appeared on the market. Such a solution has a great, location entry management model is expanded for resource protection.
currently unclaimed, potential, as it allows you to create secure static
WEB clients for computers with high security requirements. 3. Proposed approach
There are three types of access control technique such as mandatory
access control (MAC), discretionary access control (DAC), and Role 3.1. Preliminaries
based Access control (RBAC). In discretionary access control, access
control is mainly based on the Client’s identification.In MAC,client is The collection of information from individuals, computers are stored
gained to access the resources or information depends on clearance level in cloud server. There are 4significantfactors in cloud computing such as
and information classification label allocated to resource. The security confidentiality, accessibility, efficiency and durability. Confidentiality
clearance is allocated to the client where clearance level should be equal restricts content access to individuals who granted permission.In current
to or superior than sensitivity label to achieve access. Information holder era, online technologies needed authentication mechanism to secure the
must make a decision upon the sensitivity of the information and then client information from being hacked and guaranteed protection.
allocated to the classification label.In RBAC, it involved to locating cli­ Integrity is a serious factor for online information in which only
ents into cluster based on the role that assigned the privileges to execute authorized user allowed to make changes.The information in cloud
a job. system become simultaneously constrained and managed to maintain
Considering the aforementioned factors, the main objective of this content integrity.Online infrastructure is generally maintained by
paper is to provide efficient storage of information with enhanced se­ another third-party company.Clients are required verification to main­
curity. A novel hybrid cryptography based encryption approach is pro­ tain information security. Customers cannot acquire this information in
posed which combines RBAC with extended connectivity management the same location, but rather whenever everything is being corrected if
modeling vocabulary and facilitates the safe retrieval of stored data accessibility conditions are not met.Client tries to get access whatever
consuming less time.The paper is structured as follows: Section 2 in­ data required.Reliability becomes issue in online internet because
cludes the literature survey and section 3 explains the materials and network operator maintains many computers.A firm has taken database
methods. Section 4 describes the proposed techniques while the exper­ backups and then employed cyber facilities. The public access man­
imental analysis is discussed in section 5. Finally, conclusion is pre­ agement is essential claim in clouds computing [9–12].Cloud services
sented in section 6. vary in price and functionality,but guarantee flexibility, scalability and
high availability. Although the services are paid, companies are freed
2. Related works from the need to invest in the development of their own solutions,
including the purchase of expensive cryptographic equipment.
The Internet browser has advantage is "portability". Due to the The Java cryptography architecture allows you to expand the set of
availability of secure tokens with flash memory, secure solutions were cryptographic algorithms supported on the platform. Due to the high
developed, in which the most important operations with the private key prevalence of Java, many developers of cryptographic tools offer certi­
are carried out on the "board" of the token, and the browser is protected fied JCP providers.
in its flash memory. Such a solution, in addition to a high level of se­
curity, is very convenient to use.Several mechanisms are used to main­ 3.2. Proposed techniques
tain the database integrity.Erasing, backuping, and cryptography, are
three main processes through which various approaches classified. Cryptographic techniques are probably the most widely used method
Cryptography preserved information in unstable condition tremen­ of protecting information privacy on the internet.In cloud computing,
dously since it doesn’t have genuine authority over personal data [4]. proposed approach used efficient encryption technique and automated
The information required new solutions that focus on cryptography and access management design that secures and maintains privacy of sen­
access restrictions that preserve security and integrity.Encryption tech­ sitive information.In internet technology, If protected information is
nique is process of encrypting information using cryptography model. guaranteed, cryptographic technique prevents possible compromising
Mathematics trial linked with cryptography fundamentals such as se­ because of genuine individual has access to credentials [13].In theory,
curity, consistency, client identification and source identity verification these are companies of any size that develop or implement custom-built
[5].Conventional, asymmetrical and symmetrical techniques are three applications and want to integrate digital signatures or use an already
basictype of cryptography. In client, client used key to encrypt the data integrated application.
and then receiver to decrypt the data.Asymmetric cryptography is based In the case of a threat, cryptographic techniques are utilized to
on pair of keys: a Public key and a private key.Information is encoded guarantee data privacy and security. Numerous cryptographic tech­
using public key that may be shared. Then, it is decrypted using private niques, including symmetric key cryptography and public key cryptog­
key that should maintain confidential.Advanced encryption standard raphy, can be utilized during data storage and transmission depending
integrated Single-Sign-On scheme that includes owner index accessi­ on the security requirements and potential risks.Providers of document
bility protocols to guarantee access management and encryption.Infor­ management solutions or applications that want to integrate digital
mation security, privacy, and integrity are significant concern in cloud signatures or stamps. Another option: offering them as a premium option
computing. Cyber security is used that secures communication trans­ to customers as guaranteed document protection against fraud. A flex­
mitted.The protocol could never specify the cryptography technique ible model is supported here: digital signatures can be added as an
that should be employed [6].Multilevel buffers are appended to the additional layer or optional.Fig. 1: Cloud Computing and its feature.
existing CORBAC paradigm to develop the overall efficiency of any
privilege management method. The certificates issuance causes in 3.3. Role based access control with XACML
effectiveness [7]. It causes chaos on company process and multiple cli­
ents, as every relation shipneed https new certification. Distributed In internet technology, admission based security technique is
RBAC design [8] is proposed to reduce the authorization loads engaged to forbid unnecessary persons from entering into network.To
throughout single networks within a subnet.Each transformer has single establish an assurance, user is not able to do any unnecessary changes.
localized function and numerous localized responsibilities that allocated Login credentials are allocated to jobs in Role based Access Control, and
to it.The location is established for each power with another client permissions are assigned to tasks and then allocated to individuals.RBAC

63
A. Kousalya and N.-k. Baik International Journal of Intelligent Networks 4 (2023) 62–67

Fig. 1. Cloud Computing and its feature.

is authenticated a user’s identification only. RBAC is not capable to Fig. 3. Phase of data access.
observe user’s trustworthiness to limit login and protect the network
against illegitimate access. RBAC is combined with extensible access individual’s efficiency [15]. The improved RSA technique dealt with the
control markup(XACML). XACML is mainly attribute-based access con­ fault of existing RSA.It utilized two input keys: a public key used by a
trol system. Attributes act as data about the topic that access resource third party to execute actions on encrypted records, and a secret key
and resource to be noticed, and environment represented as a key for used by information holder to encrypt and decrypt data.
assessment of whether access is approved or not [3]. XACML can also be In cloud computing, symmetrical cryptography encrypts all infor­
used to implement role-based access control.This proposed method mation. The key creation and public key forms part of this cryptography.
specified RBAC rules using XACML.XACML presented an authorization In each symmetrical, “secret code”is required for encrypting the infor­
principle that has Policy Decision Point, Policy Administration Point, mation that used by information holders whereas in asymmetrical “two
Policy Information Point, Policy Enforcement Point, and Policy credentials”required for decrypting that symmetrical “secret code”
Retrieval Point.An access control in operating environment has Policy generated by the asymmetrical “two credentials”.Key pair is given to the
Enforcement Point that executes the function to authorization request cloud server which creates two asymmetrical credentials as a outcome.
and to award or reject the right to use sources. Central Policy Decision In first phase, Cloud stored the information holder’s private password
Point built the assessment on whether access is decided. The Policy Upub and private secret Cpub.In second phase, information holder ob­
Decision Point has policies that kept in the Policy Retrieval Point. Pol­ tains the key pair from cloud server and encrypted the symmetrical
icies are handled by Policy Administration Point.The proposed Role cryptographic key using key pair. Lastly, stores KE on the internet.Fig. 4
based Access Control with XACMLis depicted in Fig. 2. shows the working process that describes the Phase of key generation.
Businesses integrated digital signatures or stamps into its workflows This encoded information was then stored on the public internet as
and system integrators used digital signatures in existing and new the following phase of the key generation method. The owner secured
document management systems. Each organization must decide which their information using symmetrical key and transferred the information
DSS option best suits their project needs. It takes into account the re­ to the public cloud in an unencrypted form. Fig. 5 shows the data storage
quirements of regulatory bodies, and the size of the organization and phase of proposed work.
other factors, often unique to each case. It located the encrypted information and transmits it to the client
along with the encrypted password. The cloud repository now decoded
3.4. Rivest–Shamir–Adleman(RSA) this symmetrical secret data using its secret keys Cpriv before re-
encrypting data using the client public secret Upub.The user employs
The clients need information through the cloud repository as shown secret Uprivate to encrypt the symmetrical secret and then asymmetrical
in Fig. 3 which has phase of data access. passcode to decode the information.
The Rivest–Shamir–Adleman method technique is used for infor­
mation protection and offered anonymity.Rivest–Shamir–Adleman 3.4.1. Effectiveness of improved RSA for data security in the cloud
method utilized two input keys such as key pair that encrypt a public Numerous approaches and techniques have been proposed to
keystream, and a secret key that decrypt information which is exclu­ assurance information privacy, with cryptography being the most
sively available to the information holder [14]. This technique affects effective. Within inter-environment, this method is ineffective because
several clients have accessibility to the information that necessitates to
distributing the secret keys to all clients.Access control is very difficult to

Fig. 2. Role based Access Control with XACML. Fig. 4. Phase of key generation.

64
A. Kousalya and N.-k. Baik International Journal of Intelligent Networks 4 (2023) 62–67

permission obtained, then approval is given to related role.This data is


then transferred from the cloud.The third entity performed to run the
application and did those actions given by owners using valuations key.
An outside entity sent completed encrypted data alongwith encryption
key. A client decrypted all provided output using secret key.
The proposed authorization technique offers adversity of safety
principles that permit the client to perform task in a cloud securely.

3.5.1. Privilege
In the place of clients have more liberal which is required irre­
spectively, Privilege is necessary.In this design, each client performed
several tasks, each point has numerous executed actions, and all actions
obtain eda number of rights to achieve that Privilege. Therefore, client
offer role that utilize preferred process. Eventhough client possesses
absolute rights; this task requests authorization to carry out its activity.

3.5.2. Accessibility
Fig. 5. Data storage Phase. It produces connection among permission, responsibilities and po­
sitions, and connection among clients of computer and positions. A
carry out because risk in giving keys to several clients at the same time. range of associations offers privacy policy to be performed effectively in
The asymmetrical encryption method has a significant effect on infor­ terms of assignment of power.It allows delegation of assignment privi­
mation accessibility.Asymmetric cryptography algorithms are the best leges between one accounts to others.
and valuable technique for make the information safe.
It avoids clients from encrypting the large amount of information in a 3.5.3. Responsibilities
longer period of time. While preserving the information in inter-element In this technique, reciprocal responsibilities are necessary to carry
of cloud, Technique is needed to propose that balance between safety out critical task.
and systems efficiency.This RSA approach offers better safety, encrypt­
ing information at quicker speed and client’s has capable to retrieve 3.5.4. Trustworthiness
information in a secured and acceptable manner. An asymmetry tech­ RBAC is authenticating a user’s identification only. RBAC is not
nique used to distribute homogeneous keys amongst either cloud server capable to observe user’s trustworthiness to limit login and protect the
or allowed users. The novel approach preserved data privacy and network against illegitimate access. RBAC is combined with extensible
security. access control markup(XACML).

3.5. Process of RSA and role based access control with XACML 3.5.5. Secure information
Improved RSA method is utilized to ensure information privacy and
In proposed approach, owner secured the content using RSA to security while information getting to transferred and stored in cloud.It
guarantee information security and become available entirely. RBAC avoids abuse of Communications Service Providers (CSP) or some threat
employed XACML to give proper authorization for content access. to data kept in the cloud.
Whenever any customer asks for entry, information holder defends the
information using improved RSA method. This method utilized two 4. Result and discussion
keys: a public key in which outside entity perform transactions upon
encryption and secret key engaged to encrypt or decrypt the informa­ This work employing Java Technologies that is depending on the
tion.Within cloud computers, stable component is required that con­ number of files taken to analyze. The Java cryptography architecture
nects task and authorization which make conform the connection among allows you to expand the set of cryptographic algorithms supported on
them. the platform. Due to the high prevalence of Java, many developers of
This proposed method employed role based access with XACML on cryptographic tools offer certified JCP providers.This work is executed
permission restrictions in User account. Whenever an individual re­ on an Intel Core i7 CPU with a clock speed of 1.70 GHz with 16 GB RAM.
quests for access to content, it is determined by policy decision point; Table 1 shows overall execution time and response time foren
otherwise, command will be rejected.The procedure is started by crypting, decoding, data sending and data receiving time taken to send
administrator who produced XACML rules and attached them to Policy and receive information at various block size.
Administration Point. The produced rules are kept in policy repository Most of the asymmetric techniques are included in Table 2. The
and endorsed to policy decision point through authorized user. When Table 2 shows encryption time duration obtained.
policy is arranged, authorization requests are calculated against these The key size 1, 10, 50 and 100 with their respective time for AES,
rules. More than one rules is implemented in policy decision point. DES, RSA and improved RSAare listed in Table 4.AES has the shortest
In this XAMCL model, API Manager operated as policy enforcement information processor rate when compared to DES and RSA. Because
point. If access demand arrives to this manager, then authorization AES uses symmetric keys, only one key is needed for both encryption
request is transferred to policy decision point alongwith necessary at­ and decryption. This is distinct from RSA, which requires the use of two
tributes. Policy decision point obtained demand and its attributes and
then evaluated demand against existing rules. When demand needed
additional data, Policy decision point attempted to get that data from Table 1
Execution time and Response Time.
policy information point.Demand from API Manager which hold user­
name and rules which are implemented needs user role.Policy decision Time of Response (s) Time of Execution
point acquired this data from user store which identified as a policy Size of Block Encryption Decryption Data Send Received Data
information point. If Policy decision point has essential data to estimate (bits) (s) (s) (s) (s)
the demand, answer is transferred to API Manager with rule decision. 128 0.13 0.32 0.28 0.44
256 0.36 0.37 0.42 0.60
Authorized user performed credential process. The task is assigned if

65
A. Kousalya and N.-k. Baik International Journal of Intelligent Networks 4 (2023) 62–67

Table 2
Time to encryption Process and Key Size.
Key Size (bits) AES (s) DES’(s) RSA(s) improved RSA

1 0.04 0.04 0.08 0.07


10 0.34 0.34 0.79 0.34
50 1.63 1.91 4.59 2.30
100 4.28 6.63 5.98 5.24

Table 3
The decryption time of hybrid technique.
Decryption Time (s)

Key Size AES (s) DES’(s) RSA(s) improved RSA

1 0.04 0.04 0.05 0.05


10 0.24 0.32 2.38 3.44
50 2.86 1.93 4.87 3.23
100 4.99 6.02 3.94 3.12

Table 4
Access control models.
Description DAC MAC RBAC Role based Access Control with XACML
with improved RSA

Scalability ☓ ☓ ✓ ✓
Privileges ☓ ☓ ✓ ✓
Flexibility ☓ ☓ ✓ ✓
Authorization ☓ ☓ ☓ ☓
Delegation ✓ ☓ ☓ ✓

Fig. 7. Comparison of execution time of RSA with varied SIZE.


keys, a private key and a public key that are specifically tied to one
another. Simple random bytes make up AES keys. Furthermore, as seen Various key sizes are used to generate the empirical findings. As a result,
in Fig. 6, RSA is an asymmetrical method with the largest secret length. it is used to directly encrypt user data.
The overall execution duration of the proposed methods is depicted Throughput is the number of units of information that a system can
in Fig. 6. Therefore, to assess the unique method presented by merging process in a given length of time. Requests/unit of time is used to
the AES algorithms as an asymmetrical approach and the RSA strategy. calculate throughput. In Table 5, This study analyzed the throughput
At varying key size for processing information, which includes differences between RBAC and RBAC with XACML and improved RSA.
decryption and secret key release, is quicker than existing techniques as The throughput is measured from the beginning of request 1 to the end
demonstrated in Table 3. From the Table 3, it is cleared that with the of requests 10.It shows that the proposed accessibility paradigm out­
increase in key size, the decryption time also increases. performs than RBAC which provides a better secured permission to
The access control models forDAC MAC RBACand proposed para­ client that protect the information in a cloud.
digm such as Delegation,Scalability, Flexibility, Privileges and Autho­
rization as shown in Table 4. 5. Conclusion
The methodology used an improved RSA technique to guarantee data
security while storing data via cloud technology. RBAC regulations with The proposed architecture is constructed using improved RSA tech­
XACML are viewed as a connection to the authorization implementation. nique and RBAC with XACML to increase privacy and secure commu­
Fig. 7 shows time taken for various key size in RSA’s cryptography. nication. The study shows that this proposed accessibility model is more
advantageous than conventional RBAC. In a virtual setting, AES asym­
metrical technique is highly economical than other technique because of
speed processing the information.RSA technique has superior resilient
because of overall secret size. AES and RSA algorithm are combined to
develop improved RSA algorithm.In cryptography technique, two types
of unsymmetrical and symmetrical decryption schemes are compared at
different data inputs.These techniques encrypted and decoded

Table 5
Throughput.
Requests Through Put

RBAC Role based Access Control with XACML with improved RSA

1 32 34
3 44 48
5 54 55
7 53 57
9 49 53
Fig. 6. Encryption time of various Algorithms with varied Cryptographic
10 45 47
Key Size.

66
A. Kousalya and N.-k. Baik International Journal of Intelligent Networks 4 (2023) 62–67

information in less time for varying bit size.It is also secure and [6] D. Cofer, J. Backes, A. Gacek, D. DaCosta, M. Whalen, I. Kuz, G. Klein, G. Heiser,
L. Pike, A. Foltzer, M. Podhradsky, Secure Mathematically-Assured Composition of
dependable because of essential management strategy. In future, new
Control Models, Rockwell Collins Cedar Rapids United States, 2017 Sep 27.
key management technique will develop to distribute an encrypted se­ [7] A.G. Khan, S. Basharat, M.U. Riaz, Analysis of asymmetric cryptography in
cret to each authorized client without cloud server assistance. information security based on computational study to ensure confidentiality during
information exchange, Int. J. Sci. Eng. Res. 9 (10) (2018 Oct) 992–999.
[8] K. Soni, S. Kumar, Comparison of RBAC and ABAC security models for private
cloud, in: 2019 International Conference on Machine Learning, Big Data, Cloud and
Declaration of competing interest Parallel Computing (COMITCon), IEEE, 2019 Feb 14, pp. 584–587.
[9] G. Batra, V. Atluri, J. Vaidya, S. Sural, Deploying ABAC policies using RBAC
The authors declare that they have no known competing financial systems, J. Comput. Secur. 27 (4) (2019 Jan 1) 483–506.
[10] H. Al-Samarraie, N. Saeed, A systematic review of cloud computing tools for
interests or personal relationships that could have appeared to influence
collaborative learning: opportunities and challenges to the blended-learning
the work reported in this paper. environment, Comput. Educ. 124 (2018 Sep 1) 77–91.
[11] M.M. Sadeeq, N.M. Abdulkareem, S.R. Zeebaree, D.M. Ahmed, A.S. Sami, R.
R. Zebari, IoT and Cloud computing issues, challenges and opportunities: a review,
References Qubahan.Acad. J. 1 (2) (2021 Mar 15) 1–7.
[12] N. Mansouri, R. Ghafari, B.M. Zade, Cloud computing simulators: a comprehensive
[1] C. Butpheng, K.H. Yeh, H. Xiong, Security and privacy in IoT-cloud-based e-health review, Simulat. Model. Pract. Theor. 104 (2020 Nov 1), 102144.
systems—a comprehensive review, Symmetry 12 (7) (2020 Jul) 1191. [13] M.N. Birje, P.S. Challagidad, R.H. Goudar, M.T. Tapale, Cloud computing review:
[2] S. Mishra, S.K. Sharma, M.A. Alowaidi, Analysis of security issues of cloud-based concepts, technology, challenges and security, Int. J. Cloud Comput. 6 (1) (2017)
web applications, J. Ambient Intell. Hum. Comput. 12 (7) (2021 Jul) 7051–7062. 32–57.
[3] D. Jang, M. Shin, D. Pathirage, Security Fault tolerance for access control, in: 2020 [14] K. Jiao, G. Ye, Y. Dong, X. Huang, J. He, Image encryption scheme based on a
IEEE International Conference on Autonomic Computing and Self-Organizing generalized arnold map and RSA algorithm, Secur. Commun. Network. (2020 Jun
Systems Companion (ACSOS-C), IEEE, 2020 Aug 17, pp. 212–217. 4) 2020.
[4] M. Shakir, M. Hammood, A.K. Muttar, Literature review of security issues in saas [15] S. Shamshirband, M. Fathi, A.T. Chronopoulos, A. Montieri, F. Palumbo,
for public cloud computing: a meta-analysis, Int. J. Eng. Technol. 7 (3) (2018) A. Pescapè, Computational intelligence intrusion detection techniques in mobile
1161–1171. cloud computing environments: review, taxonomy, and open research issues, J. Inf.
[5] M. Sepczuk, Z. Kotulski, A new risk-based authentication management model Secur. Appl. 55 (2020 Dec 1), 102582.
oriented on user’s experience, Comput. Secur. 73 (2018 Mar 1) 17–33.

67

You might also like