Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/9802
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGaurav Deep-
dc.contributor.authorSidhu, Jagpreet Singh [Guided by]-
dc.contributor.authorMohana, Rajni [Guided by]-
dc.date.accessioned2023-07-22T06:49:14Z-
dc.date.available2023-07-22T06:49:14Z-
dc.date.issued2023-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/9802-
dc.descriptionPHD0263en_US
dc.description.abstractCloud computing has revolutionized data storage and ensured availability of data and storage on demand. Employees in a cloud service environment manage data storage, movement, user authorisation policies, etc. Authority given as privileges for managing cloud data to employees has become an insider threat that directly impacts user confidence, company business and company reputation. Various techniques have been proposed in the literature to handle the insider threat, but they remain non-effective as they store insider’s activity analysis in system logs, and the insider is aware of them. This thesis proposes a blockchain-based robust technique for authorisation of log files of insiders in the cloud environment. Insider authentication and activity details are stored in the blockchain. The proposed solution resolves the Insider threat issue by providing access control to system logs. This technique is tested and validated using a scyther formal system tool. Its operational competence has also been tested in python by creating blockchain nodes for multiple users. The issue of achieving better Authorisation control at the architecture level in the cloud environment has also been addressed. Scalability remains the central issue in the existing work. A distributed architecture for better insider Authorisation control in the cloud environment with multiple PEP–PDP servers is proposed to achieve significantly better results in scalability and performance. Insiders manage the PEP and PDP servers, so it is required to track their activity. Better Insider Authorisation in the proposed distributed architecture is acheived in the cloud environment with the use of a Blockchain server / Blockchain Module to store all the messages between PEP and PDP. The proposed protocol's working is verified and tested based on the four claims, alive, nisynch, secret, and commitment in Scyther which proves proposed protocol’s robustness for real-time implementations.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectClouden_US
dc.subjectInsider Threaten_US
dc.subjectPolicy Enforcementen_US
dc.subjectDecision Pointen_US
dc.subjectBlockchainen_US
dc.titleAccess Control Mechanism for Prevention of insider Threat in Distributed Cloud Environmenten_US
dc.typeThesesen_US
Appears in Collections:Ph.D. Theses

Files in This Item:
File Description SizeFormat 
PHDT_GAURAVDEEP_166207_CSE_2023.pdf4.8 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.