A Dynamic Method in the Cloud for Providing Data Security

Authors

  • Sarlarangaswamy  P G Student, Department of CSE.,St.John's College of Engineering and Technology, Yerrakota, Andhra Pradesh, India
  • Dr. U. Vidya Sagar  Professor & HOD, Department of CSE, St.John's College of Engineering and Technology, Yerrakota, Andhra Pradesh, India

Keywords:

Data-centric security, Cloud computing, Role-based access control, Authorization.

Abstract

Most present security arrangements depend on border security. In any case, Cloud computing breaks the association edges. At the point when data dwells in the Cloud, they live outside the hierarchical limits. This leads clients to a loos of control over their data and raises sensible security worries that back off the reception of Cloud computing. Is the Cloud specialist co-op getting to the data? Is it authentically applying the entrance control arrangement characterized by the client? This paper exhibits a data-driven access control arrangement with advanced part based expressiveness in which security is centeredaround ensuring client data in any case the Cloud specialist co-op that holds it. Novel character based and intermediary re-encryption methods are utilized to ensure the approval display. Data is scrambled and approval rules are cryptographically ensured to safeguard client data against the specialist co-op access or rowdiness. The approval demonstrate gives high expressiveness part progressive system and asset pecking order bolster. The arrangement exploits the rationale formalism gave by Semantic Web advances, which empowers propelled lead administration like semantic clash recognition. A proof of idea usage has been produced and a working prototypical arrangement of the proposition has been coordinated inside Google administrations.

References

  1. Cloud Security Alliance, "Security guidance for critical areas of focus in cloud computing v3.0," CSA, Tech. Rep., 2003.
  2. Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, "Feacs: A flexible and efficient access control scheme for cloud computing," in Trust, Security and Privacy in Computing and Communications,2014 IEEE 13th International Conference on, Sept 2014, pp. 310–319.
  3. B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography - PKC 2011, 2011, vol. 6571, pp. 53–70.
  4. B. B and V. P, "Extensive survey on usage of attribute based encryption in cloud," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, 2014.
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS ’06, New York, NY, USA, 2006, pp. 89–98.
  6. InterNational Committee for Information Technology Standards, "INCITS 494-2012 - information technology - role based access control - policy enhanced," INCITS, Standard, Jul. 2012. 7E. Coyne and T. R. Weil, "Abac and rbac: Scalable, flexible, and auditable access management," IT Professional, vol. 15, no. 3, pp. 14–16, 2013.
  7. Empower ID, "Best practices in enterprise authorization: The RBAC/ABAC hybrid approach," Empower ID, White paper, 2013.
  8. D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding attributes to role based access control," Computer, vol. 43, no. 6, pp. 79–81, 2010.
  9. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006.
  10. F. Wang, Z. Liu, and C. Wang, "Full secure identity-based encryption scheme with short public key size over lattices in the standard model," Intl. Journal of Computer Mathematics, pp. 1–10, 2015.
  11. M. Green and G. Ateniese, "Identity-based proxy re-encryption," in Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ser. ACNS ’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 288–306.
  12. A. Lawall, D. Reichelt, and T. Schaller, "Resource management and authorization for cloud services," in Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, ser. S-BPM ONE ’15, New York, NY, USA, 2015, pp. 18:1–18:8.
  13. D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, "Authentication and authorization methods for cloud computing platform security," Jan. 1 2015, uS Patent 20,150,007,274.
  14. R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Computer Security - ESORICS 2009. Springer Berlin Heidelberg, 2009, vol. 5789, pp. 587–604.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Sarlarangaswamy, Dr. U. Vidya Sagar, " A Dynamic Method in the Cloud for Providing Data Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1854-1859, March-April-2018.