{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T13:52:22Z","timestamp":1723557142949},"reference-count":54,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T00:00:00Z","timestamp":1689206400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2023,7,13]]},"abstract":"Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user\u2019s role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resource utilization. However, this optimization is challenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufficient knowledge, some resources may be available to the wrong roles, while others may be required by other roles but are inaccessible. This results in decreased resource utilization, requiring the redefinition of access control policies with optimal resource availability. The optimal allocation of resources can be achieved by analyzing user behaviour under different roles. The study proposes a novel method for access control that utilizes role profiling and redefines access control policies for different roles to optimize resource availability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifications provide a high-level representation of system behaviour and characteristics. This paper proposes formal specifications using the \u201cZ\u201d language to ensure accurate system behaviour in access control mechanisms. The proposed mechanism is implemented in a simulated environment and validated using four variants of the recommender approach. The study concludes that the proposed mechanism consistently enhances operational capability, minimizing over- and under-allocation of resources to roles and improving overall resource utilization within the enterprise. The proposed method is beneficial in dynamic environments where the system must adapt to evolving scenarios.<\/jats:p>","DOI":"10.1155\/2023\/3922393","type":"journal-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:35:08Z","timestamp":1689280508000},"page":"1-30","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7286-1641","authenticated-orcid":true,"given":"Amardeep","family":"Kaur","sequence":"first","affiliation":[{"name":"Punjabi University, Patiala, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2261-4957","authenticated-orcid":true,"given":"Amandeep","family":"Verma","sequence":"additional","affiliation":[{"name":"Punjabi University, Patiala, India"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45608-2_3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"3","article-title":"Assessment of access control systems","author":"V. C. Hu","year":"2006","journal-title":"NISTIR 7316"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27189-2_2"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"6","unstructured":"RushbyJ.The Bell and La padula security model1986Karamadai, TN, IndiaComputer Science LaboratoryDraft report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2013.3508"},{"issue":"1","key":"8","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jisa.2014.04.003","article-title":"An access control model for cloud computing","volume":"19","author":"Y. A Younis","year":"2014","journal-title":"Journal of Information Security and Applications"},{"key":"9","first-page":"554","article-title":"Role-based access controls","author":"D. F. Ferraiolo"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2008.231"},{"key":"11","first-page":"24","article-title":"Semantic access control model: a formal specification","volume":"3679","author":"M. Yag\u00fce","year":"2005","journal-title":"Computer Security\u2013ESORICS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8213-9.ch011"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577155"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905846"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6452-4"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_34"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3390\/s20092464"},{"key":"18","first-page":"155","article-title":"Towards activity-centric access control for smart collaborative ecosystems","author":"M. Gupta"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00008"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CIC56439.2022.00021"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3145358"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2022.3163185"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.4324\/9781315115757-7"},{"key":"24","first-page":"340","article-title":"Survey on access control model in cloud computing environment","author":"X. Li"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2014.6103"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6452-4"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13728-5_73"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2018.05.010"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74500-8"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.731"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3720"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2911-7_4"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.5.1357-1365"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.133"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/3398036"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1947-8"},{"key":"37","first-page":"189","article-title":"Analyzing machine learning approaches for online malware detection in cloud","author":"J. C. Kimmell"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032997"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01484-4"},{"issue":"2","key":"40","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2021.0120243","article-title":"Survey of centralized and decentralized access control models in cloud computing","volume":"12","author":"S. Almutairi","year":"2021","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6926408"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54997-8_5"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01228-4"},{"issue":"3\u20134","key":"44","first-page":"221","article-title":"Foundations of the B method","volume":"22","author":"D. Cansell","year":"2003","journal-title":"Computing and Informatics"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-277-3","volume-title":"Specification of Software Systems","author":"V. S. Alagar","year":"2011"},{"key":"46","article-title":"Using Z. Structure","author":"J. Woodcock","year":"1996"},{"key":"47","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-34209-8_22","article-title":"Z formal specification language","volume-title":"Mathematics in Computing","author":"G. O\u2019Regan","year":"2020"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxn016"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTCCM.2017.59"},{"key":"50","article-title":"The specifications of E-Commerce Secure System using Z language. II(III)","author":"M. M. Noaman"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.14421\/ijid.2018.07104"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1145\/2993.357247"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/3338843"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1145\/3464421"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/3922393.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/3922393.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/3922393.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:35:18Z","timestamp":1689280518000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jece\/2023\/3922393\/"}},"subtitle":[],"editor":[{"given":"Ayman","family":"Al-Quraan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,7,13]]},"references-count":54,"alternative-id":["3922393","3922393"],"URL":"https:\/\/doi.org\/10.1155\/2023\/3922393","relation":{},"ISSN":["2090-0155","2090-0147"],"issn-type":[{"value":"2090-0155","type":"electronic"},{"value":"2090-0147","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7,13]]}}}