Superior-Grained Dual-Factor Access Control Designed for Web-Based Cloud Computing Services
Keywords:
Fine-grained, two-factor, access control, Web services, ASA, RSA, DelfiHellmanAbstract
In this paper, we present another fine-grained two-variable validation (2FA) access control framework for electronic distributed computing administrations. In particular, in our proposed 2FA access control framework, a property based access control system is executed with the need of both a client secret key and a lightweight security device. As a client can't access the framework on the off chance that they do not hold both, the instrument can improve the security of the framework, particularly in those situations where numerous clients have the same PC for online cloud administrations. Likewise, characteristic based control in the framework too enables the cloud server to restrict the access to those clients with the same arrangement of properties while preserving client protection, i.e., the cloud server just realizes that the client satisfies the required predicate, however no clue has on the precise personality of the client. Finally, we likewise complete a simulation to exhibit the practicability of our proposed 2FA framework.
References
- Kashif Munir and Prof Dr. Sellapan Palaniappan," FRAMEWORK FOR SECURE CLOUD COMPUTING", IJCCSA,Vol.3, No.2, April 2013.
- Mr. AnkushKudale, Dr. Binod Kumar," A STUDY ON AUTHENTICATION AND ACCESS CONTROL FOR CLOUD COMPUTING", Vol. 1(2), July 2014 (ISSN: 2321-8088).
- Harvinder Singh1, Amandeep Kaur2," Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication", Volume 4 Issue 11, November 2015.
- Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, and JianyingZhou,"k-times attribute-based anonymous access control for cloud computing", IEEE Transactions on Computers, 64 (9), 2595-2608.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption," in Proc. IEEE Symp.Secur. Privacy, May 2007, pp. 321-334.
- D. Boneh, X. Boyen, and H. Shacham, “Short group signatures," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 41- 55.
- D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities," ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60-82, 2004.
- J. Camenisch, “Group signature schemes and payment systems based on the discrete logarithm problem," Ph.D. dissertation, ETH Zurich, Zürich, Switzerland, 1998.
- J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer with access control," in Proc. 16th ACM Conf. Comput.Commun.Secur.(CCS), Chicago, IL, USA, Nov. 2009, pp. 131-140.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.