Investigation and Validation of Distributed PEP-PDP Authorization Architecture in Insider Access Control Mechanism in Scyther

  • Er. Gaurav deep, Dr. Jagpreeet Sidhu, Dr. Rajni Mohana
Keywords: Hypervisor, Insider Threats, Discretionary access control model, Policy Enforcement Point, Policy Decision Point, Cloud.

Abstract

Cloud authorization techniques have helped in numerous applications where user authorization management is required. Authorization Framework Policies were implemented by using PEP-PDP Architecture.  PEP receives user authorization requests, and PDP helps in making required Decisions based on authorization rules. Various Authorization languages use this model. The limitation of this model is that it uses a single PEP-PDP. It can handle a limited number of Requests. Various Research Scholars have proposed PEP-PDP Model applications. Yaseen et al. [24] have also suggested the Multiple PEP-PDP Model. This model, too, suffers from various Limitations. This paper investigates and validates our Proposed Distributed PEP-PDP Architecture in Scyther Formal Verification Tool. This paper also proposes to uses Asymmetric Encryption in Distributed PEP-PDP Architecture. In this Proposed Architecture, 4PDPs, along with PEPs, are connected. In Scyther, all required claims were achieved using asymmetric encryption, which suggests the proposed system is robust

Published
2021-09-01
How to Cite
Dr. Rajni Mohana, E. G. deep, D. J. S. (2021). Investigation and Validation of Distributed PEP-PDP Authorization Architecture in Insider Access Control Mechanism in Scyther. Design Engineering, 10487- 10496. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/3927
Section
Articles