Skip to main content

2021 | OriginalPaper | Buchkapitel

Data Security in Cloud Computing Using Abe-Based Access Control

verfasst von : Rajanikanth Aluvalu, V. Uma Maheswari, Krishna Keerthi Chennam, S. Shitharth

Erschienen in: Architectural Wireless Networks Solutions and Security Issues

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Business organizations and individual users are using cloud storage for storing their data and files. Cloud storage is managed by cloud service provider (CSP) being third party person to the data owners. Cloud storage consists of user's confidential data. After storing data in cloud, the owner of data cannot have control over data, where owner cannot trust the CSP because possibility of a malicious administrator. Based on this, different schemes are proposed. Security is a major concern for cloud stored data, and CSP has to provide trust to the data owner on security of the cloud stored data. In general, security to data and applications is provided through authentication and authorization. Security through authentication is provided by distributing user name and password to data users. However, the organizational user is not allowed to access all the organizational data. Authorization for accessing the data is provided by using access control models. Regular models are not enough to use the CSP based on the models uses dynamic method and proposed different models using attribute-based encryption (ABE). Earlier access control models cannot be used because of multiple disadvantages. This chapter will discuss dynamic access control model named as RA-HASBE. This model is proved to be scalable and flexible, due to sub-domain hierarchy. It is also proved to be dynamic by permitting user to access the data by risk evaluation using risk engine.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hao R, Yang H, Zhou Z (2019) Driving behavior evaluation model base on big data from internet of vehicles. Int J Ambient Comput Intell (IJACI) 10(4):78–95CrossRef Hao R, Yang H, Zhou Z (2019) Driving behavior evaluation model base on big data from internet of vehicles. Int J Ambient Comput Intell (IJACI) 10(4):78–95CrossRef
2.
Zurück zum Zitat Das SK, Sachin T (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159 Das SK, Sachin T (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159
3.
Zurück zum Zitat Kandukuri R, Paturi VR, Rakshit A (2009) Cloud security issues. In: Proceedings of the 2009 IEEE international conference on services computing, pp 517–520 Kandukuri R, Paturi VR, Rakshit A (2009) Cloud security issues. In: Proceedings of the 2009 IEEE international conference on services computing, pp 517–520
4.
Zurück zum Zitat Neena Antony A. Melvin AR (2012) A survey on encryption schemes in the clouds for access control. Int J Comput Sci Manage Res 1(5):1135–1139 Neena Antony A. Melvin AR (2012) A survey on encryption schemes in the clouds for access control. Int J Comput Sci Manage Res 1(5):1135–1139
5.
Zurück zum Zitat Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Foren Secur 7(2):743–754 Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Foren Secur 7(2):743–754
6.
Zurück zum Zitat Kandala S, Sandhu R, Bhamidipati V (2011) An attribute based framework for risk-adaptive access control models, availability, reliability and security (ARES). In: 6th international conference, pp 236–241 Kandala S, Sandhu R, Bhamidipati V (2011) An attribute based framework for risk-adaptive access control models, availability, reliability and security (ARES). In: 6th international conference, pp 236–241
7.
Zurück zum Zitat Aluvalu R, Lakshmi M (2016) A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE Aluvalu R, Lakshmi M (2016) A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE
8.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98
9.
Zurück zum Zitat Aluvalu, R, Lakshmi M (2015) Access control model with enhanced flexibility and scalability for cloud. In: 2015 international conference on green computing and Internet of Things (ICGCIoT). IEEE Aluvalu, R, Lakshmi M (2015) Access control model with enhanced flexibility and scalability for cloud. In: 2015 international conference on green computing and Internet of Things (ICGCIoT). IEEE
10.
Zurück zum Zitat Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, pp 735–737 Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, pp 735–737
11.
Zurück zum Zitat Aluvalu R, Lakshmi M (2016) Risk aware hierarchical attribute set-based encryption (RA-HASBE) access control model. Annals. Comput Sci Ser 14(2) Aluvalu R, Lakshmi M (2016) Risk aware hierarchical attribute set-based encryption (RA-HASBE) access control model. Annals. Comput Sci Ser 14(2)
12.
Zurück zum Zitat Aluvalu R, Muddana L (2015) A survey on access control models in cloud computing. In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of India (CSI) vol 1, no 1, pp 653–664 Aluvalu R, Muddana L (2015) A survey on access control models in cloud computing. In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of India (CSI) vol 1, no 1, pp 653–664
13.
Zurück zum Zitat Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security, pp 587–604 Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security, pp 587–604
14.
Zurück zum Zitat Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Proceedings of Asiacrypt, vol 2501. LNCS, pp 548–566 Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Proceedings of Asiacrypt, vol 2501. LNCS, pp 548–566
15.
Zurück zum Zitat John B, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp 321–334 John B, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp 321–334
16.
Zurück zum Zitat Aluvalu R, Kamliya V, Muddana L (2016) HASBE access control model with secure key distribution and efficient domain hierarchy for cloud computing. Int J Electr Comput Eng 6(2):770 Aluvalu R, Kamliya V, Muddana L (2016) HASBE access control model with secure key distribution and efficient domain hierarchy for cloud computing. Int J Electr Comput Eng 6(2):770
17.
Zurück zum Zitat Sarwar A, Khan MN (2013) A review of trust aspects in cloud computing security. Int J Cloud Comput Serv Sci (IJ-CLOSER) 2(2):116–122. . ISSN: 2089–3337 Sarwar A, Khan MN (2013) A review of trust aspects in cloud computing security. Int J Cloud Comput Serv Sci (IJ-CLOSER) 2(2):116–122. . ISSN: 2089–3337
18.
Zurück zum Zitat Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592CrossRef
19.
Zurück zum Zitat Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616CrossRef Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616CrossRef
20.
Zurück zum Zitat Devi D, Arun PS (2014) A design for secure data sharing in cloud. Int J Eng Res Gener Sci 2(5):72–77 Devi D, Arun PS (2014) A design for secure data sharing in cloud. Int J Eng Res Gener Sci 2(5):72–77
21.
Zurück zum Zitat Liang C, Jason C (2011) Risk-aware role-based access control. In: 7th international workshop, STM 2011, Copenhagen, Denmark, pp 140–156 Liang C, Jason C (2011) Risk-aware role-based access control. In: 7th international workshop, STM 2011, Copenhagen, Denmark, pp 140–156
22.
Zurück zum Zitat Thirumaleshwari Devi B, Shitharth S (2020) An Appraisal over intrusion detection systems in cloud computing security attacks. In: 2nd International Conference on Innovative Mechanisms for Industry applications, ICIMIA -2020, ConferenceProceedings, pp 122 Thirumaleshwari Devi B, Shitharth S (2020) An Appraisal over intrusion detection systems in cloud computing security attacks. In: 2nd International Conference on Innovative Mechanisms for Industry applications, ICIMIA -2020, ConferenceProceedings, pp 122
23.
Zurück zum Zitat Shitharth S, Sangeetha PK (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA. In: Design Framework for wireless network, Lecture notes in network and systems, vol 82, issue 1, Springer, pp 41–64 Shitharth S, Sangeetha PK (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA. In: Design Framework for wireless network, Lecture notes in network and systems, vol 82, issue 1, Springer, pp 41–64
24.
Zurück zum Zitat Shitharth S, Shaik M, Sangeetha S, Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Infor Sec IET 14(1):1–11 Shitharth S, Shaik M, Sangeetha S, Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Infor Sec IET 14(1):1–11
25.
Zurück zum Zitat Shitharth DP, Winston D (2017) An enhanced optimization algorithm for intrusion detection in SCADA network. J Comput Sec, Elsevier 70:16–26 Shitharth DP, Winston D (2017) An enhanced optimization algorithm for intrusion detection in SCADA network. J Comput Sec, Elsevier 70:16–26
26.
Zurück zum Zitat Shitharth DP, Winston, (2016) A new probabilistic relevancy classification (PRC) based intrusion detection system (IDS) for SCADA network. J Elect Eng 16(3):278–288 Shitharth DP, Winston, (2016) A new probabilistic relevancy classification (PRC) based intrusion detection system (IDS) for SCADA network. J Elect Eng 16(3):278–288
27.
Zurück zum Zitat Kumar, Parmar Vipul J, Aluvalu RK (2015) Key policy attribute-based encryption (KP-ABE): a review. Int J Innov Emerg Res Eng 2:49–52 Kumar, Parmar Vipul J, Aluvalu RK (2015) Key policy attribute-based encryption (KP-ABE): a review. Int J Innov Emerg Res Eng 2:49–52
28.
Zurück zum Zitat Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA (2021) A novel and secure approach for quantum key distribution in a cloud computing environment. In: Balas VE, Semwal VB, Khandare A, Patil M (eds) Intelligent Computing and Networking. Lecture Notes in Networks and Systems, vol 146. Springer, Singapore Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA (2021) A novel and secure approach for quantum key distribution in a cloud computing environment. In: Balas VE, Semwal VB, Khandare A, Patil M (eds) Intelligent Computing and Networking. Lecture Notes in Networks and Systems, vol 146. Springer, Singapore
Metadaten
Titel
Data Security in Cloud Computing Using Abe-Based Access Control
verfasst von
Rajanikanth Aluvalu
V. Uma Maheswari
Krishna Keerthi Chennam
S. Shitharth
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0386-0_4