Dynamic Access Control In Cloud Computing Using Encryption/Decryption

ravindra r, krishna chaitanya r

Abstract


Cloud computing has emerged as one of the most important paradigms in the IT industry for last few years. In general data owners and service providers are not in the same trusted domain in cloud computing. Service providers should not be a trusted one anyhow they are all third party. The system focuses on a novel technique to Hierarchical Attribute Set Based Encryption (HASBE); it is driven by the Cipher Policy attribute based encryption (CPABE) with a  hierarchic al structure of cloud users. Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use the data. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security. The proposed work focuses CRM (Customer Relationship Management) for business model that is driven by the category of Software as a Service (Saas) method in cloud. Using this scheme it achieves the flexible, scalable and fine grained access control of data. It also achieves high secure and effective user revocation in cloud environment.

 


Keywords


:Cloud Computing, Access Control , Security Encryption, Encryption Techniques.

References


K.Priyadarsini, C.Thirumalai selvan,”A Survey on Encryption Schemes for Data Sharing in Cloud Computing”, (IJCSITS), ISSN: 2249-9555,Vol. 2, No.5, October 2012.

Neena Antony, A. Alfred Raja Melvin,”ASurvey on Encryption Schemes in the Clouds for Access Control”,International Journal of Computer Science and ManagementResearch Vol 1 Issue 5 December 2012

.

Abdul Raouf Khan,”Access Control in Cloud Computing Environment”, ARPN Journal of Engineering and Applied Sciences, Vol. 7, No. 5, May 2012 Issn 1819-6608.

Yan Zhu, Hongxin Huy, GailJoon Ahny, Dijiang Huangy, and Shanbiao Wang,” TowardsTemporal Access Control in Cloud Computing”,INFOCOM 2012

.

Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou,” AchievingSecure, Scalable, and Fine -grained Data Access Control in Cloud Computing”,INFOCOM10.

Guojun Wang, Qin Liu, Jie Wub, Minyi Guo,”Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers”,Jul 1, 2011.

Miss. Rehana Begum, Mr. R.Naveen Kumar, Mr. Vorem Kishore,”Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing “, Volume 2, Issue 11, November 2012.

Chittaranjan Hota, Sunil Sanka,”Capabilitybased Cryptographic Data Access Control in Cloud Computing”,

Int. J. Advanced Networking and Applications, Volume: 03; Issue: 03; Pages: 11521161 (2011)

.

V.Suma,K.Vijay Kuma,”An Efficient Scheme For Cloud Services Based On Access Policies”,International Journal of Engineering Research & Technology (IJERT),Vol. 1 Issue 8, October –2012,ISSN: 2278-0181

.

R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,” in Proceedings of the 2009 IEEE International

Conference on Services Computing, pp. 517

-520, September 2009.

R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-

2005.

R.Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.

L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.

Salesforce.com, Inc., “Force.com platform,” Retrieved Dec. 2009, from http://www.salesforce.com/tw/

.

SAP AG., “SAP services: maximize your success,” Retrieved Jan. 2010, from http://www.sap.com/services/index.epx.

.

D. Benslimane, S. Dustdar, and A. Sheth, "Services mashups: the new generation of web applications". IEEE Internet Computing, vol. 12, no. 5, pp. 13–

, 2008.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.