Cloud Data Security Using RBAC

Authors

  • B. Mounika  M.Tech Scholar, Department of Computer Science &Engineering, Bharat Institute of Engineering &Technology, Hyderabad, India
  • R. Balamurugan  Associate Professor, Department of Computer Science &Engineering,Bharat Institute of Engineering &Technology, Hyderabad, India

Keywords:

Verifiability, Cloud Computing, Role-Based Access Control, Authorization, Re-Encryption, Cloud Storage, Attribute Based Encryption, Data-Centric Security

Abstract

A disbursed garage framework is accumulating of capacity servers. A Secure cloud is a stable wellspring of statistics. Sponsorship of the cloud is a very essential mission for cloud agreement providers. Today is the purpose of low-support framework which mechanizes enterprise every day and withal intention of get admission to manipulate over device so facts safety is stored up and observed out. Part predicated get to manipulate (RBAC) technique controls access to PC or system property predicated at the elements given to singular clients interior an affiliation. Parts are characterized through paintings talent, domination, and duty inner an affiliation. In RBAC, elements may be without problems triggered, transmuted, or suspended because the desiderata of an association consist of, without fresh the advantages for each utilizer.

References

  1. Uma Somani, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010). Volume 64, pp.211-216
  2. Leena Khanna " Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them" International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3 March - 2013, pp. 279-283.
  3. Wei-Tek Tsai "Role-Based Access-Control Using Reference Ontology in Clouds"978-0-7695-4349-9/11 $26.00 © 2011 IEEE DOI 10.1109/ISADS.2011.21
  4. Ajit Singh, "Securing Data by Using CryptographywithSteganography""International Journal of Advanced Research in Computer Science and Software Engineering"Volume 3, Issue 5, May 2013 ,pp.404-402
  5. Rashmi Nigoti "A Survey of Cryptographic Algorithms for Cloud Computing" IJETCAS 13-123; March-May 2013, pp.141-146
  6. Parsi Kalpana "Data Security in Cloud Computing using RSA Algorithm" International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
  7. Esh Narayan" To Enhance the data security of cloud in cloudcomputing using RSA Algorthim", Bookman International Journal of Software Engineering, Vol. 1 No. 1 Sep. 2012 ,ISSN No. 2319- 4278
  8. Pradeep Bhosale" Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October - 2012 ,ISSN: 2278-0181
  9. Vishakha Lokhande" Efficient Encryption and Decryption Services for Cloud Computing", International Journal of Societal Applications of Computer Science,Vol 1 Issue 2 December 2012 ISSN 2319 - 8443.
  10. RuWei Huang, Si Yu, Wei Zhuang and XiaoLin Gui, "Design of Privacy-Preserving Cloud Storage Framework" 2010 Ninth International Conference on Grid and Cloud Computing.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
B. Mounika, R. Balamurugan, " Cloud Data Security Using RBAC, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.857-860, September-October-2017.