Security And Privacy Issues In Cloud Computing

Authors

  • Bade Ankammarao  Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
  • Ravu Venkata Koteswarlu  Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Keywords:

Authorization, Cloud computing, Encryption, Data models Authorization, Data-centric security, Cloud computing, Role-based access control .

Abstract

Most present security arrangements depend on border security. In any case, Cloud figuring breaks the association borders. At the point when information lives in the Cloud, they dwell outside the hierarchical limits. This leads clients to loos of control over their information and raises sensible security worries that back off the reception of Cloud processing. Is the Cloud specialist co-op getting to the information? Is it honest to goodness applying the get to control strategy characterised by the client? This paper displays an information driven get to control arrangement with enhanced part based expressiveness in which security is centered around ensuring client information in any case the Cloud specialist co-op that holds it. Novel personality based and intermediary re-encryption systems are utilized to ensure the approval display. Information is scrambled and approval standards are cryptographically secured to save client information against the specialist co-op get to or bad conduct. The approval display furnishes high expressiveness with part chain of importance and asset progressive system bolster. The arrangement exploits the rationale formalism gave by Semantic Web advances, which empowers propelled govern administration like semantic clash identification. A proof of idea usage has been produced and a working prototypical organisation of the proposition has been coordinated inside Google administrations.

References

  1. Cloud Security Alliance, "Security guidance for critical areas of focus in cloud computing v3.0," CSA, Tech. Rep., 2003.
  2. Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, "Feacs: A flexible and efficient access control scheme for cloud computing," in Trust, Security and Privacy in Computing and Communications,2014 IEEE 13th International Conference on, Sept 2014, pp. 310-319.
  3. B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography - PKC 2011, 2011, vol. 6571, pp. 53-70.
  4. B. B and V. P, "Extensive survey on usage of attribute based encryption in cloud," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, 2014.
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS ’06, New York, NY, USA, 2006, pp. 89-98.
  6. InterNational Committee for Information Technology Standards, "INCITS 494-2012 - information technology - role based access control - policy enhanced," INCITS, Standard, Jul. 2012.
  7. E. Coyne and T. R. Weil, "Abac and rbac: Scalable, flexible, and auditable access management," IT Professional, vol. 15, no. 3, pp. 14-16, 2013.
  8. Empower ID, "Best practices in enterprise authorization: The RBAC/ABAC hybrid approach," Empower ID, White paper, 2013.
  9. D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding attributes to role based access control," Computer, vol. 43, no. 6, pp. 79-81, 2010.
  10. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
  11. F. Wang, Z. Liu, and C. Wang, "Full secure identity-based encryption scheme with short public key size over lattices in the standard model," Intl. Journal of Computer Mathematics, pp. 1-10, 2015.
  12. M. Green and G. Ateniese, "Identity-based proxy re-encryption," in Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ser. ACNS ’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 288-306.
  13. Lawall, D. Reichelt, and T. Schaller, "Resourcmanagement and authorization for cloud services," in Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, ser. S-BPM ONE ’15, New York, NY, USA, 2015, pp. 18:1-18:8.
  14. D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, "Authentication and authorization methods for cloud computing platform security," Jan. 1 2015, uS Patent 20,150,007,274.
  15. R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Computer Security
  16. ESORICS 2009. Springer Berlin Heidelberg, 2009, vol. 5789, pp. 587-604.G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proceedings of the 17th ACM Conference on Computer and Communications Security, ser. CCS ’10, New York, NY, USA, 2010, pp. 735-737.
  17. J. Liu, Z. Wan, and M. Gu, "Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing," in Information Security Practice and Experience. Springer Berlin Heidelberg, 2011, vol. 6672, pp. 98- 107.
  18. W3COWL Working Group, "OWL 2 Web Ontology Language: Document overview (second edition)," World Wide Web Consortium (W3C), W3C Recommendation, Dec. 2012. J. M. A. Calero, J. M. M. Perez, J. B. Bernabe, F. J. G. Clemente, G. M. Perez, and A.
  19. F. G. Skarmeta, "Detection of semantic conflicts in ontology and rule-based information systems," DataKnowledge Engineering, vol. 69, no. 11, pp. 1117- 1137, 2010.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Bade Ankammarao, Ravu Venkata Koteswarlu, " Security And Privacy Issues In Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.274-279, July-August-2017.