Research Article Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing Amardeep Kaur and Amandeep Verma Punjabi University, Patiala, India CorrespondenceshouldbeaddressedtoAmandeepVerma;vaman71@gmail.com Received 6 April 2023; Revised 31 May 2023; Accepted 1 July 2023; Published 13 July 2023 AcademicEditor:AymanAl•Quraan Copyright©2023AmardeepKaurandAmandeepVerma.TisisanopenaccessarticledistributedundertheCreativeCommons AttributionLicense,whichpermitsunrestricteduse,distribution,andreproductioninanymedium,providedtheoriginalworkis properlycited. Enterprisecloudcomputingprovidesvariousservicestoenterprises,butaccesstotheseservicesiscontrolledbyafrewall.Te frewalldeterminestheactionsandoperationsalegitimateusercanperformontheavailableresources.Accesscontrolpolicies alloworrestrictaccesstoresources,andtheyalsokeeparecordofattemptedaccess.Intherole•basedaccesscontrolmodel,access toresourcesisbasedonauser’sroleintheenterprise.Asresourcesarelimited,thepolicymanagerhastocreatepoliciesthat optimizeresourceavailabilitytodiferentrolestoimproveoverallresourceutilization.However,thisoptimizationischallenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufcient knowledge, some resourcesmaybeavailabletothewrongroles,whileothersmayberequiredbyotherrolesbutareinaccessible.Tisresultsin decreasedresourceutilization,requiringtheredefnitionofaccesscontrolpolicieswithoptimalresourceavailability.Teoptimal allocationofresourcescanbeachievedbyanalyzinguserbehaviourunderdiferentroles.Testudyproposesanovelmethod for accesscontrolthatutilizesroleproflingandredefnesaccesscontrolpolicies fordiferentrolestooptimizeresourceavailability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifcations provideahigh•levelrepresentationofsystembehaviourandcharacteristics.Tispaperproposesformalspecifcationsusingthe Z”languagetoensureaccuratesystembehaviourinaccesscontrolmechanisms.Teproposedmechanismisimplementedin asimulatedenvironmentandvalidatedusingfourvariantsoftherecommenderapproach.Testudyconcludesthattheproposed mechanism consistently enhances operational capability, minimizing over• and under•allocation of resources to roles and improvingoverallresourceutilizationwithintheenterprise.Teproposedmethodisbenefcialindynamicenvironmentswhere the system must adapt to evolving scenarios. 1.Introduction Enterprise cloud computing ofers infrastructure, software, and platform services to an enterprise whose access is controlledbyafrewall.Enterprisecloudcomputingresults inbetterspeedandperformanceofcomputingresourcesas well as improved utilization and lower operational and infrastructure costs for an enterprise. Enterprise cloud computing provides a secure computing environment, providing the capability for access control policies, where decisionsarebasedonnumerousfactors,suchastheroleof the user defned within the enterprise, the type ofdataor applicationbeingaccessedbytheuser,andthekindofdevice being used. Enterprise clouds are better than conventional on•premiseserversandotherstoragesystemsbecausethey arefaster,reducelatency,andpreventdataloss. Te primary objective of access control is to ensure security. In situations where resources are limited or opti• mizingtheirutilizationisimportant,suchasinanenterprise cloud environment, access control can be employed to re• strict resource access to only those users who genuinely requireit.However,thisrequirementmaychangeovertime. Traditional access control models face a challenge in that theirpoliciesarestaticandlackarecommendersystemto adaptthembasedonresourceusage.Tispaperintroduces amechanismtotacklethisissue.Tenoveltyofthispaper liesinproposingtheutilizationofaccesscontroltoenhance theoverallserviceofanenterprisecloud,aimingtoachieve Hindawi Journal of Electrical and Computer Engineering Volume 2023, Article ID 3922393, 30 pages https://doi.org/10.1155/2023/3922393