Privacy Preserving and Fine-Grained Data Access Control in Cloud Computing

Authors(3) :-S.Anto, S. Vimal, V.GuruMahesh

To real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern. Therefore, this paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. Since our Data Center has 10 petabytes of data, there is a huge task to provide real-time protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate how data is in use. The use of BPMN simulation allows us to evaluate the chosen security performances before actual implementation.

Authors and Affiliations

S.Anto
Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India
S. Vimal
Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India
V.GuruMahesh
Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India

CCAF, BPMN, Data Center, SaaS, Data Protection

  1. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing – The business perspective," Decision Support Syst., vol. 51, no. 1, pp. 176–189, 2011.
  2. M. A. Vouk, "Cloud computing—issues, research and implementations," J. Comput. Inf. Technol.—CIT, vol. 4, pp. 235–246, 2008.
  3. A. K. Jha, C. M. DesRoches, E. G. Campbell, K. Donelan, S. R. Rao, T. G. Ferris, and D. Blumenthal, "Use of electronic health records in US hospitals," New England J. Med., vol. 360, no. 16, pp. 1628– 1638, 2009.
  4. H. T. Peng, W. W. Hsu, C. H. Chen, F. Lai, and J. M. Ho, "Financial  cloud: open cloud framework of derivative pricing," in Proc. Int. Conf. Social Comput., Sep. 2013, pp. 782–789.
  5. G. McGraw, Software Security: Building Security. Reading, MA, USA: Addison-Wesley, 2006.
  6. P. Brooks and J. Chittenden, Metrics for Service Management: Designing for ITIL. Zaltbommel, Netherlands: Van Haren Publishing, 2012.
  7. V. Chang, R. J. Walters, and G. Wills, Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research. New York, NY, USA: Springer CLOSER 2012, CCIS 367, pp. 245–264, 2013.
  8. V. Chang, "Business intelligence as service in the cloud," Future Gener. Comput. Syst., vol. 37, pp. 512–534, 2014.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 541-543
Manuscript Number : CSEIT1722185
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S.Anto, S. Vimal, V.GuruMahesh, "Privacy Preserving and Fine-Grained Data Access Control in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.541-543, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722185

Article Preview

Follow Us

Contact Us