Access Control Method, Cloud Computing Framework, Cloud Computing, Encryption

Authors

  • Paurnima Prakash Kawale  MTech Scholor, Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engg and Technology Nahpur, Maharashtra, India
  • Prof. Roshani Talmale  Dept. of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engg and Technology Nahpur, Maharashtra, India

Keywords:

Cyber Physical Social Systems, PageRank algorithm, Personalized Web search, Web Logs .

Abstract

In various organizations the demand for the cloud computing going on increasing day by day. That growing acceptance is only due the various services provided by the cloud computing. As the cloud computing provides basic services like allowing for infrastructure sharing , large storage, multi-tenancy which would ultimately leads to increase computational efficiency, flexibility, decrease complexity, and also reduces the data processing cost. But with this, security plays very important role in the success of cloud computing. Most common issues with cloud computing includes data ownership, data privacy and its proper storage for efficient manipulation and updating. Protecting the data of the data owners from an unauthorized users would requires to perform the encryption operation on the entire data and this mechanism increases cost as well as the processing time. Proposed system has some solutions to overcome such problems by using the concept of data classification according to its importance and combined access control with Time and attribute factors for time sensitive data in public cloud. Data get classified according its importance in three categories and the choice of the encryption algorithm will depends on the data importance. That will make the computing efficient. Time and Attribute factors when collectively considered for providing the access control that will provide the data confidentiality, privacy as well as security requirement for time-sensitive data that stored in public cloud. Enhanced security and analysis of system performance proved that proposed system is efficient as well as provides the security requirement for any organization and indivuals.

References

  1. Flexible, Secure and Reliable Data Sharing Service Based on Collaboration in Multi-cloud Environment, Qing Wei, Huaibin Shao and Gongxuan Zhang, 30 April 2018.
  2. Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojum Wang & Jie wu, “DABKS: Dynamic Attributes based Keyword search in cloud computing ,” IEEE communication and information system security symposium. 2017.
  3. K. Yang, Z. Liu, X. Jia, and X. Shen, “Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach,” IEEE Transaction on Multimedia, vol.18, no, pp. 940-950, 2016.
  4. Sheren A. El-Booz, Gamal Attiya, Nawal El-Fishawy,“A Secure Cloud Storage System Combining time-based One Time Password & Automatic blocker Protocol,” International Computer Engineering Conference, December 2015.
  5. Dr. R. Sugumar, K. Arul Marie Jaycee, " Data Security in Cloud Using Enhanced Symmetric Encryption Algorithm,” International Journal of Engineering Research and Technology, Vol. 6 Issue 10, Oct. 2017.
  6. V Gokula Krishnam, J Gowtham Kumar, I Kalyyanasundar, R Sanjay,“A Secure Multi-ware Dynamic Group Data Sharing in Cloud, " IJARIIE, Vol.-4 Issue 2018
  7. Lo’ai Tawalbeh, Raad S. Al-Qassas, Nour S. Darwazeh, Yaser Jararweh, fahd Al-Dosari“Security attack & Cryptography Solutions for Data Sharing in Public Cloud Storage,” International Conference on cloud and Autonomic Computing, 2015.
  8. S. Arul Oli, Dr. L. Arockiam,“Ensure & Secure Data Confidentiality in Cloud Computing Environment Using Data Obfuscation Technique,” International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 5, Issue 1, Jan. 2016.
  9. Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Computing,” IEEE Transaction on Service Computing.
  10. Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang , Shiwen Mao, Long Hu,” Privacy Protection & Intrusion Detection for Cloudlet-based Medical Data Sharing.” IEEE Transaction on Cloud Computing, Vol.XX, No. YY, MONTH 20XX.
  11. F. J. M. Pasquier, Jitender Singh, Jean Bacon, Olivier Hermant, “An Information Flow Control Model for Cloud Computing.”
  12. Priyanka S. Mane, Yogesh B. Gurav, “Secure Cloud Computing Using Decentralized Information Flow Control.” IARJSET Vol. 3, Issue 6, June 2016.
  13. M. Quwaider and Y. Jararweh, “Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57-71. 2015.
  14. H. Tian, Y. Chen, C.-C. Chang H. Jiang, Y. Huang, Y. Chen, and J. Liu, “Dynamic-hash-table based public auditing for secure cloud storage,” IEEE Transaction on Service Computing, Available online, 2016.
  15. Vishal R Pancholi, Dr. Bhadresh P Patel, “Enhancement of cloud computing with secure data storage using AES,” International journal for Innovative Research in science and Technology, Vol. 2, Issue 9, Feb. 2016
  16. Ibrahim M. Al-Jabri, Mustafa I. Eid, M. Sadiq Sohail, ”A Group Decision-Making Method for Selecting Cloud Computing Service Model,” International Journal of Advanced Computer Science and Applications, Vol.9, No.1,2018.
  17. Dr. Ramalingam Sugumar, K. Raja, “Study on Enhancing Data Security in Cloud Computing Environment,” International Journal of Computer Science and Mobile Applications, Vol.6 Issue.3, March-2018, pg.44-49.
  18. J. Li, W. Yao, Y. Zhang, and H. Qian, “Flexible and fine-grained attribute-based data storage in cloud computing,” IEEE Transactions on Service Computing, Available online, 2016.
  19. H. Wang, “Identity-based distributed provable data possession in multi cloud storage,” IEEE Transactions on Services computing, vol. 8, no.2, pp. 328-340, 2015.
  20. Varsha Alangar, “Cloud computing Secuirity and Encryption,” International Journal of Advance Research in Computer Science and Management Studies, Vol. 1, Issue 5, Oct. 2013.
  21. Bhairavi Kesalkar, Deepali Bagde, Manjusha Barsagade, Namita Jakulwar, Prof. Shrikant Zade, “Implementation of Data De-Duplication using Cloud Computing,” IJARIIT 2018.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Paurnima Prakash Kawale, Prof. Roshani Talmale, " Access Control Method, Cloud Computing Framework, Cloud Computing, Encryption, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 3, pp.183-187, May-June-2019.