Javascript must be enabled to continue!
Modeling Privilege Access using NGAC for Cloud Attack Landscape
View through CrossRef
Abstract
The adoption of public clouds, private clouds, and on-premise environments has grown significantly. This business-critical transformation and migration to the cloud have greatly amplified the risks associated with privileged access mismanagement. Traditional Privileged Access Management (PAM) and Identity and Access Management (IAM) solutions struggle to adequately address sophisticated threats, such as privilege escalations, lateral movements, and misconfigurations. To bridge these critical gaps, we propose an innovative PAM framework using the NIST’s Next Generation Access Control (NGAC) applying Hypergraph semantics. We develop model NGAC policy graph as labeled hypergraphs and hy-peredges and apply set-theoretic semantics to evaluate policies as part of the enforcement engine. We establish multi-source, multi-destination policy graphs based on dynamic graph traversals and constraint validations. This unique approach captures dynamic, multi-dimensional privilege relationships , enabling fine-grained, context-aware policy enforcement across diverse cloud infrastructures. Our comprehensive experimental evaluation demonstrates that NGAC combined with hypergraph representations significantly outperforms conventional Attribute-Based Access Control (ABAC) and traditional NGAC graph models, reducing the complexity of privilege mismanagement use-cases from superlinear O(n k) in traditional methods to logarithmic O(n log(n)) in our case, thus markedly improving scalability. Real-world cloud infrastructure use cases validate our method’s ability to swiftly identify over-privileged users, unauthorized privilege escalations, and potential lateral movement attack pathways. This work introduces a novel theoretical framework for dynamic privilege management, fundamentally altering the landscape of access control in distributed cloud systems. By delivering a robust and scalable solution for privilege management in multi-cloud environments , our research provides a critical advancement in cybersecurity practice, offering actionable insights for mitigating high-risk cloud vulner-abilities in near real-time.
Title: Modeling Privilege Access using NGAC for Cloud Attack Landscape
Description:
Abstract
The adoption of public clouds, private clouds, and on-premise environments has grown significantly.
This business-critical transformation and migration to the cloud have greatly amplified the risks associated with privileged access mismanagement.
Traditional Privileged Access Management (PAM) and Identity and Access Management (IAM) solutions struggle to adequately address sophisticated threats, such as privilege escalations, lateral movements, and misconfigurations.
To bridge these critical gaps, we propose an innovative PAM framework using the NIST’s Next Generation Access Control (NGAC) applying Hypergraph semantics.
We develop model NGAC policy graph as labeled hypergraphs and hy-peredges and apply set-theoretic semantics to evaluate policies as part of the enforcement engine.
We establish multi-source, multi-destination policy graphs based on dynamic graph traversals and constraint validations.
This unique approach captures dynamic, multi-dimensional privilege relationships , enabling fine-grained, context-aware policy enforcement across diverse cloud infrastructures.
Our comprehensive experimental evaluation demonstrates that NGAC combined with hypergraph representations significantly outperforms conventional Attribute-Based Access Control (ABAC) and traditional NGAC graph models, reducing the complexity of privilege mismanagement use-cases from superlinear O(n k) in traditional methods to logarithmic O(n log(n)) in our case, thus markedly improving scalability.
Real-world cloud infrastructure use cases validate our method’s ability to swiftly identify over-privileged users, unauthorized privilege escalations, and potential lateral movement attack pathways.
This work introduces a novel theoretical framework for dynamic privilege management, fundamentally altering the landscape of access control in distributed cloud systems.
By delivering a robust and scalable solution for privilege management in multi-cloud environments , our research provides a critical advancement in cybersecurity practice, offering actionable insights for mitigating high-risk cloud vulner-abilities in near real-time.
Related Results
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
The adoption of cloud services by companies and organizations is increasingly becoming essential for enhancing competitive performance in today's business environment. Cloud servic...
Meridionally tilted ice cloud structures in the tropical upper troposphere as seen by CloudSat
Meridionally tilted ice cloud structures in the tropical upper troposphere as seen by CloudSat
Abstract. It remains challenging to quantify global cloud properties and uncertainties associated with their impacts on climate change because of our poor understanding of cloud th...
Meridionally-tilted ice cloud structures in the tropical Upper Troposphere as seen by CloudSat
Meridionally-tilted ice cloud structures in the tropical Upper Troposphere as seen by CloudSat
Abstract. It remains challenging to quantify global cloud properties and uncertainties associated with their impacts on climate change because of our poor understanding of cloud th...

