Research Article
Adaptive Access Control Mechanism (AACM) for Enterprise
Cloud Computing
Amardeep Kaur and Amandeep Verma
Punjabi University, Patiala, India
CorrespondenceshouldbeaddressedtoAmandeepVerma;vaman71@gmail.com
Received 6 April 2023; Revised 31 May 2023; Accepted 1 July 2023; Published 13 July 2023
AcademicEditor:AymanAl•Quraan
Copyright©2023AmardeepKaurandAmandeepVerma.TisisanopenaccessarticledistributedundertheCreativeCommons
AttributionLicense,whichpermitsunrestricteduse,distribution,andreproductioninanymedium,providedtheoriginalworkis
properlycited.
Enterprisecloudcomputingprovidesvariousservicestoenterprises,butaccesstotheseservicesiscontrolledbyafrewall.Te
frewalldeterminestheactionsandoperationsalegitimateusercanperformontheavailableresources.Accesscontrolpolicies
alloworrestrictaccesstoresources,andtheyalsokeeparecordofattemptedaccess.Intherole•basedaccesscontrolmodel,access
toresourcesisbasedonauser’sroleintheenterprise.Asresourcesarelimited,thepolicymanagerhastocreatepoliciesthat
optimizeresourceavailabilitytodiferentrolestoimproveoverallresourceutilization.However,thisoptimizationischallenging
without prior knowledge of user behaviour and resource requirements for each role. Due to insufcient knowledge, some
resourcesmaybeavailabletothewrongroles,whileothersmayberequiredbyotherrolesbutareinaccessible.Tisresultsin
decreasedresourceutilization,requiringtheredefnitionofaccesscontrolpolicieswithoptimalresourceavailability.Teoptimal
allocationofresourcescanbeachievedbyanalyzinguserbehaviourunderdiferentroles.Testudyproposesanovelmethod for
accesscontrolthatutilizesroleproflingandredefnesaccesscontrolpolicies fordiferentrolestooptimizeresourceavailability.
Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifcations
provideahigh•levelrepresentationofsystembehaviourandcharacteristics.Tispaperproposesformalspecifcationsusingthe
“Z”languagetoensureaccuratesystembehaviourinaccesscontrolmechanisms.Teproposedmechanismisimplementedin
asimulatedenvironmentandvalidatedusingfourvariantsoftherecommenderapproach.Testudyconcludesthattheproposed
mechanism consistently enhances operational capability, minimizing over• and under•allocation of resources to roles and
improvingoverallresourceutilizationwithintheenterprise.Teproposedmethodisbenefcialindynamicenvironmentswhere
the system must adapt to evolving scenarios.
1.Introduction
Enterprise cloud computing ofers infrastructure, software,
and platform services to an enterprise whose access is
controlledbyafrewall.Enterprisecloudcomputingresults
inbetterspeedandperformanceofcomputingresourcesas
well as improved utilization and lower operational and
infrastructure costs for an enterprise. Enterprise cloud
computing provides a secure computing environment,
providing the capability for access control policies, where
decisionsarebasedonnumerousfactors,suchastheroleof
the user defned within the enterprise, the type ofdataor
applicationbeingaccessedbytheuser,andthekindofdevice
being used. Enterprise clouds are better than conventional
on•premiseserversandotherstoragesystemsbecausethey
arefaster,reducelatency,andpreventdataloss.
Te primary objective of access control is to ensure
security. In situations where resources are limited or opti•
mizingtheirutilizationisimportant,suchasinanenterprise
cloud environment, access control can be employed to re•
strict resource access to only those users who genuinely
requireit.However,thisrequirementmaychangeovertime.
Traditional access control models face a challenge in that
theirpoliciesarestaticandlackarecommendersystemto
adaptthembasedonresourceusage.Tispaperintroduces
amechanismtotacklethisissue.Tenoveltyofthispaper
liesinproposingtheutilizationofaccesscontroltoenhance
theoverallserviceofanenterprisecloud,aimingtoachieve
Hindawi
Journal of Electrical and Computer Engineering
Volume 2023, Article ID 3922393, 30 pages
https://doi.org/10.1155/2023/3922393