Privacy Preserving and Fine-Grained Data Access Control in Cloud Computing

Authors

  • S.Anto  Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India
  • S. Vimal  Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India
  • V.GuruMahesh  Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, TamilNadu, India

Keywords:

CCAF, BPMN, Data Center, SaaS, Data Protection

Abstract

To real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern. Therefore, this paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. Since our Data Center has 10 petabytes of data, there is a huge task to provide real-time protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate how data is in use. The use of BPMN simulation allows us to evaluate the chosen security performances before actual implementation.

References

  1. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing – The business perspective," Decision Support Syst., vol. 51, no. 1, pp. 176–189, 2011.
  2. M. A. Vouk, "Cloud computing—issues, research and implementations," J. Comput. Inf. Technol.—CIT, vol. 4, pp. 235–246, 2008.
  3. A. K. Jha, C. M. DesRoches, E. G. Campbell, K. Donelan, S. R. Rao, T. G. Ferris, and D. Blumenthal, "Use of electronic health records in US hospitals," New England J. Med., vol. 360, no. 16, pp. 1628– 1638, 2009.
  4. H. T. Peng, W. W. Hsu, C. H. Chen, F. Lai, and J. M. Ho, "Financial  cloud: open cloud framework of derivative pricing," in Proc. Int. Conf. Social Comput., Sep. 2013, pp. 782–789.
  5. G. McGraw, Software Security: Building Security. Reading, MA, USA: Addison-Wesley, 2006.
  6. P. Brooks and J. Chittenden, Metrics for Service Management: Designing for ITIL. Zaltbommel, Netherlands: Van Haren Publishing, 2012.
  7. V. Chang, R. J. Walters, and G. Wills, Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research. New York, NY, USA: Springer CLOSER 2012, CCIS 367, pp. 245–264, 2013.
  8. V. Chang, "Business intelligence as service in the cloud," Future Gener. Comput. Syst., vol. 37, pp. 512–534, 2014.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
S.Anto, S. Vimal, V.GuruMahesh, " Privacy Preserving and Fine-Grained Data Access Control in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.541-543, March-April-2017.