A Secured Storage using AES Algorithm and Role Based Access in Cloud

Authors

  • M. Saraswathi  Assistant Professor, Department of CSE,SCSVMV University,Kanchipuram, Tamilnadu, India
  • T. Bhuvaneswari  Assistant Professor, Department of Computer Applications,Queen’s Mary College, Chennai,Tamilnadu, India

Keywords:

Cloud Computing, Data Storage, Access Control, Data Confidentiality, Integrity

Abstract

Cloud computing provides lot of advantages such as on demand service, cost effectiveness, elasticity, scalable, pay per use .One of the main drawback of cloud computing is data security .when data migrate to the cloud , is fully controlled by cloud service provider not by the data owner .As a result user data is not secure at the server side.The main contribution of this paper to designed a prototype which uses a encryption technique to store data and Retrieve data using access control .Instead of applying encryption technique to the whole dataset, we are applying attribute based encryption to only any confidential data in the database and the same encrypted data sent to cloud server. Accessing of data by authorized users via access control methods and polices. Finally achieve data confidentiality and integrity in cloud computing.

References

  1. Darwazeh, Nour S., Raad S. Al-Qassas, and Fahd AlDosari. "A Secure Cloud Computing Model based on Data Classification." Procedia Computer Science 52 (2015):,pp. 1153-1158.
  2. Shaikh, Rizwana, and M. Sasikumar. "Data Classification for Achieving Security in CloudComputing." Procedia Computer Science (2015): pp. 493-498.
  3. Zardari, Munwar Ali, Low Tang Jung, and Nordin Zakaria. "K-NN classifier for data confidentiality in cloud computing." In Computer and Information Sciences (ICCOINS), 2014 International Conference on, IEEE, 2014, pp. 1-6
  4. Sandeep K. Sood A combined approach to ensure data security in cloud computing Journal of Network and Computer Applications 35 (2012) 1831–1838
  5. Sudha Devi Dorairaj and Thilagavathy Kaliannan An Adaptive Multilevel Security Framework for the DataStored in Cloud Environment Hindawi Publishing Corporation Scientific World JournalVolume 2015, Article ID 601017, 11 pageshttp://dx.doi.org/10.1155/2015/601017
  6. A Study on Data Storage Security Issues in Cloud ComputingNaresh vurukonda1, B.Thirumala Rao
  7. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  8. Bokefode J.D, Ubale S. A, Apte Sulabha S,Modani D. G, Analysis of DAC MAC RBAC Access Control based Models for Security, International Journal of Computer Applications, Volume 104 – No.5, October 2014.
  9. Yang, P. Lai, J. Lin, Design role-based multi-tenancy access control scheme for cloud services.
  10. International Conference on Computational Modeling and Security (CMS 2016)Security Algorithms for Cloud Computing

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
M. Saraswathi, T. Bhuvaneswari, " A Secured Storage using AES Algorithm and Role Based Access in Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.511-515, July-August-2017.