Dynamic Access Control In Cloud Computing Using Encryption/Decryption
Abstract
Cloud computing has emerged as one of the most important paradigms in the IT industry for last few years. In general data owners and service providers are not in the same trusted domain in cloud computing. Service providers should not be a trusted one anyhow they are all third party. The system focuses on a novel technique to Hierarchical Attribute Set Based Encryption (HASBE); it is driven by the Cipher Policy attribute based encryption (CPABE) with a  hierarchic al structure of cloud users. Cloud computing is known as “Utilityâ€. Cloud Computing enabling users to remotely store their data in a server and provide services on demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use the data. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security. The proposed work focuses CRM (Customer Relationship Management) for business model that is driven by the category of Software as a Service (Saas) method in cloud. Using this scheme it achieves the flexible, scalable and fine grained access control of data. It also achieves high secure and effective user revocation in cloud environment.
Â
Keywords
References
K.Priyadarsini, C.Thirumalai selvan,â€A Survey on Encryption Schemes for Data Sharing in Cloud Computingâ€, (IJCSITS), ISSN: 2249-9555,Vol. 2, No.5, October 2012.
Neena Antony, A. Alfred Raja Melvin,â€ASurvey on Encryption Schemes in the Clouds for Access Controlâ€,International Journal of Computer Science and ManagementResearch Vol 1 Issue 5 December 2012
.
Abdul Raouf Khan,â€Access Control in Cloud Computing Environmentâ€, ARPN Journal of Engineering and Applied Sciences, Vol. 7, No. 5, May 2012 Issn 1819-6608.
Yan Zhu, Hongxin Huy, GailJoon Ahny, Dijiang Huangy, and Shanbiao Wang,†TowardsTemporal Access Control in Cloud Computingâ€,INFOCOM 2012
.
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou,†AchievingSecure, Scalable, and Fine -grained Data Access Control in Cloud Computingâ€,INFOCOM10.
Guojun Wang, Qin Liu, Jie Wub, Minyi Guo,â€Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud serversâ€,Jul 1, 2011.
Miss. Rehana Begum, Mr. R.Naveen Kumar, Mr. Vorem Kishore,â€Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing “, Volume 2, Issue 11, November 2012.
Chittaranjan Hota, Sunil Sanka,â€Capabilitybased Cryptographic Data Access Control in Cloud Computingâ€,
Int. J. Advanced Networking and Applications, Volume: 03; Issue: 03; Pages: 11521161 (2011)
.
V.Suma,K.Vijay Kuma,â€An Efficient Scheme For Cloud Services Based On Access Policiesâ€,International Journal of Engineering Research & Technology (IJERT),Vol. 1 Issue 8, October –2012,ISSN: 2278-0181
.
R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,†in Proceedings of the 2009 IEEE International
Conference on Services Computing, pp. 517
-520, September 2009.
R. Sterritt, “Autonomic computing,†Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-
2005.
R.Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,†Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.
L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,†ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
Salesforce.com, Inc., “Force.com platform,†Retrieved Dec. 2009, from http://www.salesforce.com/tw/
.
SAP AG., “SAP services: maximize your success,†Retrieved Jan. 2010, from http://www.sap.com/services/index.epx.
.
D. Benslimane, S. Dustdar, and A. Sheth, "Services mashups: the new generation of web applications". IEEE Internet Computing, vol. 12, no. 5, pp. 13–
, 2008.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â