Cloud-Based Access Control

43 Pages 1 – 5 Chapters6,513 WordsDownload Complete Material

The Cloud-Based Access Control Complete Project Material (PDF/DOC)

Abstract

Access control system is a system that manages access through the authorization or revocation of rights to physical or logical assets within an organization or a practice of restricting entrance to a property, building, or room to authorized persons.
Cloud based security services are migrating from dedicated hardware solutions to cloud-based security services using Software as a Service (SAAS) model.
Cloud based security door allows you to control your entire device from anywhere, review events, share access or remotely configure security.

Chapter One

1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The increase in virtualized and cloud networks is boosting demand for cloud based security, because data and applications are now more portable and distributed across a wide variety of networks. This means that security applications need to live as software in the cloud, rather than as dedicated hardware appliances protecting specific points of the network.
Demand is rising for cloud based, SAAS security solutions and the market is growing rapidly. These services can be provided as single features or as part of a larger, integrated SaaS package. Most current security systems possess outdated technology that relies on human monitoring which opens the opportunity door for more automated versions in the cloud. These security tools are also being integrated with software-defined networking (SDN) SDN to deliver a network that can use real-time analytics and monitoring to protect against emerging threats.
Cloud computing security or, more simply, cloud-based access control refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
A cloud-based access control system provides centralized management, visibility and control without the cost and complexity of traditional physical access systems.
Systems like Kisi come equipped with centralized management, real-time updates, cloud wiring, diagnostics and much more. They can be deployed rapidly without training or proprietary command line interfaces, let alone expensive certifications. They also provide integrations with the software your company uses for its operations, visitor management and door scheduling.
A cloud-service is accessible over the web from anywhere, there is no need to worry about backups or upgrades, and customers receive continuous improvements without having to do anything. In addition, a cloud-based service is much simpler to integrate with other systems than an on-premise solution.
A cloud service with IP-connected hardware also means that the physical location of the doors is irrelevant. With this device it does not matter if you have one building with 100 doors or 10 buildings—anywhere in the world—with 10 doors each.

1.2 PROBLEM STATEMENT
There are numerous types of access control systems which were generally belief that they are efficient and effective in terms of security. But later on it was discovered that all have many limitations or disadvantages that hinders some people not to use it, such as, in GSM based access control system depended on GSM network provider to operate which means that whenever there is not network in the area of usage the device will not operate. In order to solve all these problems seen in other access control devices a cloud based access control security system is invented. This device allows one to control his entire device from anywhere. It operates through the cloud.

1.3 AIM AND OBJECTIVES OF THE PROJECT
The main aim of this work is to design a security system which is being managed directly from the cloud. At the end of this work, student will be able to do the following:
• Apply access control techniques to meet confidentiality and integrity goals
• Understand and implement the major terms and concepts related to access control and tie them to system security.

1.4 SIGNIFICANCE OF THE PROJECT
The first and most obvious advantage of cloud management is the lack of any geographical limitations [4].
Access control can be shared between locations, cities, countries or even continents, with each access point being managed directly from the cloud.
Alerts can instantly travel from one part of the world to the other, regardless of language or time zone [4].
Distance simply becomes irrelevant.

1.5 BENEFIT OF THE STUDY
• Professional Management: Hosted access control eliminates the need for dedicated employees to manage the system, generating additional cost savings. All access information can be stored and managed by highly trained professionals operating from a remote operations center. System functions, including adding, modifying and deleting users, assigning individual access levels, programming scheduled door locking and unlocking and other vital access control actions can be performed remotely by professional monitoring providers on a 24/7 basis.
• Timely Updates: Beyond initial deployment, this model also eliminates many of the ongoing operating expenses associated with access control systems, including the cost of site visits to repair or update system components. For example, software providers regularly release updates that improve the functionality and security of their solutions. Installing these updates manually may require a technician to make a site visit, which can add cost to the system. Alternately, updating software may depend on the end user to complete the process in house. In these situations, updates often go uninstalled, often for long periods of time, leaving users without valuable new functionality and more susceptible to security breaches, etc. Under a hosted access control model, security professionals manage these updates and other system functions remotely, without disrupting the system’s operation. In addition to handling updates, providers can also ensure that systems are regularly backed up remotely to ensure continuity and the availability of critical audit trail information in the event of a network outage or other disruption.
• Proactive Service: Beyond regular system operation, updates and backups, cloud-based access control enables remote system diagnostics allowing dealers and integrators to detect and address potential problems with devices, networks and other system components quickly and often proactively. Many issues, such as rebooting a device, can be addressed from the monitoring center, eliminating costlier site visits and further contributing to savings. This ensures maximum system uptime and reliability, which are extremely important in any security application.
• RMR: An added bonus is the recurring monthly revenue (RMR) security professionals can generate by providing these services on either a standalone basis or as add-ons to traditional maintenance contracts.
• Improved Security: Hosted access control systems are monitored constantly, which reduces the potential for access credentials to be shared and eliminates the ability for missing or stolen cards to be used to gain unauthorized entry to a building or sensitive areas within. Should an employee be locked out of a building during non-business hours, the monitoring center can verify the individual’s identity and remotely lock and unlock doors he or she is authorized to access.
• Reports: Access data is collected and maintained remotely to generate hassle-free reporting of system usage, which is often required for compliance with company, industry or government regulations. These reports can be provided either on a regularly scheduled or on-demand basis.
• Best-In-Breed Selections: Dealers and integrators don’t have to take on all product solutions to offer this option. Rather, they can partner with best-in-class providers who offer the solutions and services that make up a robust, fully-functional system. Open platforms that enable seamless integration between door hardware, access readers, software and other system components allow dealers and integrators to utilize best-in-breed solutions from providers who specialize and excel in their specific areas, and who are able to focus on what they do best rather than trying to provide an end-to-end solution themselves.
• Scalability: Potential applications for hosted access control are seemingly unlimited given the ease with which cloud-based access control systems can scale, making them appropriate for practically any size customer and application. The flexibility and scalability of these systems allow users to specify the level of control they need now and easily add doors later as needed, ensuring that the system can keep pace with an enterprise’s growth as well.
• TCO/ROI: Taking advantage of the many benefits of the cloud to deliver hosted and managed access control solutions is an innovative way to meet the needs of any end user, particularly those who lack the budget and other resources to host and manage their own localized system. Best of all, by working with trusted partners to deploy, administer and maintain systems, end users are able to devote their time and energy to their core business and operations.
• Peace Of Mind: This cost-effective option also provides customers with the peace of mind that their systems are being monitored and managed around the clock, and ensures maximum uptime and reliability without the costs and other limitations associated with traditional systems.

1.6 LIMITATION OF THE PROJECT
One of the largest challenges of implementing cloud-based security is the need to maintain consistent control and visibility across the different domains. With many existing networks, there is a combination of public and private (and even hybrid) cloud-based services, which makes the integration of security services and strategy a big task [8].

1.7 RESEARCH QUESTION
What is cloud based security?
How does cloud based security work?
What is the best home security system?

1.8 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.

Chapter Two

2.0 LITERATURE REVIEW
2.1 Introduction

The chapter presents a review of related literature that supports the current research on the Cloud-Based Access Control, systematically identifying documents with relevant analyzed information to help the researcher understand existing knowledge, identify gaps, and outline research strategies, procedures, instruments, and their outcomes

Table of Contents

COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT

CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
1.2 PROBLEM STATEMENT
1.3 AIM / OBJECTIVE OF THE PROJECT
1.4 SIGNIFICANCE OF THE PROJECT
1.5 SCOPE OF THE PROJECT
1.6 LIMITATION OF THE PROJECT
1.7 RESEARCH QUESTION
1.8 PROJECT ORGANISATION

CHAPTER TWO
LITERATURE REVIEW
2.1 REVIEW OF CLOUD SECURITY SYSTEM
2.2 REVIEW OF DIFFERENT CLOUD SECURITY CONTROLS
2.3 DIMENSIONS OF CLOUD SECURITY
2.4 CLOUD SECURITY AND PRIVACY
2.5 CLOUD VULNERABILITY AND PENETRATION TESTING
2.6 REVIEW OF RELATED WORK

CHAPTER THREE
3.0 METHODOLOGY
3.1 BASICS OF THE SYSTEM
3.2 FEATURES OF CLOUD-BASED ACCESS
3.3 SYSTEM DESCRIPTION
3.4 PROPOSED SCHEME
3.5 BASIC OPERATIONS OF THE PROPOSED MODEL

CHAPTER FOUR
4.1 RESULT AND DISCUSION
4.2 CLOUD-BASED VS. TRADITIONAL
4.3 CLOUD SECURITY PRECAUTIONS
4.4 ADVANTAGES OF CLOUD BASED ACCESS CONTROL

CHAPTER FIVE
5.1 CONCLUSION
5.2 RECOMMENDATION
5.3 REFERENCES

How To Download Complete Material (PDF/Doc)

This Research Work On “Cloud-Based Access Control” Complete Material Can Be Downloaded Through Whatsapp, Email Or Download Link. Click The Below Button To Proceed:

Disclamer:

This study on the Cloud-Based Access Control is solely for academic research purposes only and should be used as a research guideline or source of ideas. Copying word-for-word or submitting the entire project work to your school is unethical academic behavior and “UniProjects” is not part of it.