Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2021

28-08-2020

FAST: Fast Accessing Scheme for data Transmission in cloud computing

Authors: Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal

Published in: Peer-to-Peer Networking and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid advancement of emerging technologies, a huge amount of data is created and processed in daily life. Nowadays, Cloud Computing (CC) technology is one of the frequently adopted technologies to access and store data over the internet. CC mainly provides on-demand and pay-per-use services to users. However, access control and security are two major issues that users face in a cloud environment. During data access from a cloud server, the searching time of a Data Owner (DO) and the data accessing time are high. Therefore, users utilize more cloud services and pay more. High system overhead is another issue of a cloud environment. In this paper, a novel access control model has been proposed to overcome all these concerns. Here, the Cloud Service Provider (CSP) maintains a temporary table based on the data type and popularity value of the DO for fast and efficient data accessing. The cloud service provider can easily search the data owner by using the table and the data accessing time is remarkably reduced. Experimental results and theoretical analysis of the proposed scheme prove its efficiency over the existing schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Huth A, Chebula J (2011) The basics of cloud computing,. Carnegie Mellon University Huth A, Chebula J (2011) The basics of cloud computing,. Carnegie Mellon University
2.
go back to reference Namasudra S, Nath S, Majumder A (2014) Profile based access control model in cloud computing environment. In: Proceedings of the International Conference on Green Computing, Communication and Electrical Engineering, IEEE, Coimbatore, India, pp. 1–5 Namasudra S, Nath S, Majumder A (2014) Profile based access control model in cloud computing environment. In: Proceedings of the International Conference on Green Computing, Communication and Electrical Engineering, IEEE, Coimbatore, India, pp. 1–5
3.
go back to reference Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4(4):223–230CrossRef Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4(4):223–230CrossRef
4.
go back to reference Namasudra S, Roy P (2017) A new table based protocol for data accessing in cloud computing. J Inf Sci Eng 33(3):585–609MathSciNet Namasudra S, Roy P (2017) A new table based protocol for data accessing in cloud computing. J Inf Sci Eng 33(3):585–609MathSciNet
5.
go back to reference Gao X, Jiang Z, Jiang R. A novel data access scheme in cloud computing. In Proceedings of the 2nd International Conference on Computer and Information Applications, 2012, pp. 124–127 Gao X, Jiang Z, Jiang R. A novel data access scheme in cloud computing. In Proceedings of the 2nd International Conference on Computer and Information Applications, 2012, pp. 124–127
7.
go back to reference Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comp Sci Eng 2(8):18–21 Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comp Sci Eng 2(8):18–21
8.
go back to reference Namasudra S, Roy P, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models, IEEE, Tindivanam, India Namasudra S, Roy P, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models, IEEE, Tindivanam, India
10.
go back to reference Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis, pp. 53–68 Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis, pp. 53–68
11.
go back to reference Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded and Communications Systems (ICIIECS), IEEE, Coimbatore, India Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded and Communications Systems (ICIIECS), IEEE, Coimbatore, India
12.
go back to reference Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intelligence Tech 5(1):9–14CrossRef Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intelligence Tech 5(1):9–14CrossRef
13.
go back to reference Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105CrossRef Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105CrossRef
14.
go back to reference Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547CrossRef Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547CrossRef
15.
go back to reference Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics (IJARB) (in press) Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics (IJARB) (in press)
16.
go back to reference Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis
17.
go back to reference Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 153–166 Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 153–166
18.
go back to reference Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Transactions on Multimedia Computing, Communications, and Application (in press) Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Transactions on Multimedia Computing, Communications, and Application (in press)
19.
go back to reference Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 27–34 Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 27–34
20.
go back to reference Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30(4):14–31CrossRef Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30(4):14–31CrossRef
21.
go back to reference Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4(3):159–174CrossRef Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4(3):159–174CrossRef
22.
go back to reference Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis
24.
go back to reference Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10) Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10)
25.
go back to reference Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In Proceedings of the 15th National Computer Security Conference, Baltimore, USA, pp. 554–563 Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In Proceedings of the 15th National Computer Security Conference, Baltimore, USA, pp. 554–563
26.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, USA, pp. 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, USA, pp. 89–98
27.
go back to reference Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, pp. 1–9 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, pp. 1–9
28.
go back to reference Ajgaonkar S, Indalkar H, Jeswani J (2015) Activity based access control model for cloud computing. Int J Curr Eng Techn 5(2):708–713 Ajgaonkar S, Indalkar H, Jeswani J (2015) Activity based access control model for cloud computing. Int J Curr Eng Techn 5(2):708–713
29.
go back to reference Raghavendra S, Meghana K, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comp Sci 89:293–300CrossRef Raghavendra S, Meghana K, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comp Sci 89:293–300CrossRef
30.
go back to reference Murugan A, Thilagavathy R (2018) Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In Proceedings of the IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017), IEEE, pp. 2263–2268 Murugan A, Thilagavathy R (2018) Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In Proceedings of the IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017), IEEE, pp. 2263–2268
31.
go back to reference Almutairi A, Sarfraz MI, Ghafoo A (2018) Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Trans Cloud Computing 6(1):168–181CrossRef Almutairi A, Sarfraz MI, Ghafoo A (2018) Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Trans Cloud Computing 6(1):168–181CrossRef
32.
go back to reference Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Sec 7(2):743–754CrossRef Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Sec 7(2):743–754CrossRef
33.
go back to reference Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust based access control model in cloud computing. China Comm 11(4):154–162CrossRef Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust based access control model in cloud computing. China Comm 11(4):154–162CrossRef
34.
go back to reference Alam Q, Malik SUR, Akhunzada A, Choo KKR, Tabbasum S, Alam M (2017) A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans Inf Forensics Sec 12(6):1259–1268CrossRef Alam Q, Malik SUR, Akhunzada A, Choo KKR, Tabbasum S, Alam M (2017) A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans Inf Forensics Sec 12(6):1259–1268CrossRef
35.
go back to reference Xie Y, Wen H, Wu B, Jiang Y, Meng J (2019) A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Trans Cloud Computing 7(2):383–391CrossRef Xie Y, Wen H, Wu B, Jiang Y, Meng J (2019) A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Trans Cloud Computing 7(2):383–391CrossRef
36.
go back to reference Namasudra S (2018) Cloud computing: a new era. J Fund Appl Sci 10(2):113–135 Namasudra S (2018) Cloud computing: a new era. J Fund Appl Sci 10(2):113–135
37.
go back to reference Calheiros RN, Ranjan R, Beloglazov A (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software-Pract Exp (SPE) 41(1):23–50CrossRef Calheiros RN, Ranjan R, Beloglazov A (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software-Pract Exp (SPE) 41(1):23–50CrossRef
41.
go back to reference Tripura J, Roy P (2017) Flow forecasting in multiple sections of a river system. KSCE J Civ Eng 21(2):512–522CrossRef Tripura J, Roy P (2017) Flow forecasting in multiple sections of a river system. KSCE J Civ Eng 21(2):512–522CrossRef
42.
go back to reference Tripura J, Roy P, Barbhuiya AK (2018) Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting. J Eng Technol 50(3):434–449 Tripura J, Roy P, Barbhuiya AK (2018) Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting. J Eng Technol 50(3):434–449
Metadata
Title
FAST: Fast Accessing Scheme for data Transmission in cloud computing
Authors
Suyel Namasudra
Rupak Chakraborty
Seifedine Kadry
Gunasekaran Manogaran
Bharat S. Rawal
Publication date
28-08-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00959-6

Other articles of this Issue 4/2021

Peer-to-Peer Networking and Applications 4/2021 Go to the issue

Premium Partner