Multi Authority Access Control Mechanism for Role Based Access Control for Data Security in the Cloud Environment

Authors

  • Mahesh B Gunjal Research Scholar: Department of Computer Science and Engineering, Dr. A. P. J Abdul Kalam University Indore (MP)
  • Vijay R Sonawane

Keywords:

Role Based Access Control, AES, Cloud data security, Multi Authority Access Control

Abstract

There has been an increasing tendency toward storing vast amounts of data on the cloud, which can be attributed to the rapid advancements that are taking place in cloud computing. As a result, the critical concern of how to manage and prevent unauthorized access to data that is kept in the cloud has been raised as a result of this. We present a secure data sharing approach, which, by utilizing Role-Based Access Control and the AES encryption method, is capable of achieving secure key distribution & information sharing for dynamic groups. The data is protected by our system, which also allows for its regeneration in the event that it is mishandled by an unauthorized user. A Proxy server will be given responsibility for completing this task. The information pertaining to the users would be kept in both the public and the private portions of the cloud storage. Users will only be able to access the data stored in the public cloud, allowing the private cloud to maintain its higher level of security. The original data that was stored in the private cloud would be collected by the Proxy server as soon as any unauthorized changes are made, and it will then be given back to the user. Users of cloud storage are typically provided with a variety of redundancy configuration options in order to achieve the optimal level of performance while also maintaining an acceptable level of fault tolerance. The system has the ability to concurrently achieve the highest possible level of both security and privacy. The results of our experiments have led us to the conclusion that computations on the client side that involve encryption and decryption can produce accurate results.

Downloads

Download data is not yet available.

References

Y. Wang, Y. Ma, K. Xiang, Z. Liu and M. Li, “A Role-Based Access Control System Using Attribute-Based Encryption,” in IEEE Int. Conf. Big Data Artific. Intellig. (BDAI), June 2018, pp. 128-133.

M. Ghafoorian, D. Abbasinezhad-Mood and H. Shakeri, “A thorough trust and reputation based RBAC model for secure data storage in the cloud,” IEEE Tran. Paral. Distribut. Sys., vol. 30, pp.778-788, 2018.

S. U. Muthunagai and R. Anitha, “Secure Access Control Method in Cloud Environment Using Improved Attribute Based Encryption Technique,” Int. J. Engineer. Adv. Tech. (IJEAT), 2019.

H. Gadouche, Z. Farah and A. Tari, “A correct-by-construction model for attribute-based access control,” Clust. Comp., pp. 1-12, 2019.

S. Chakraborty, R. Sandhu and R. Krishnan, “On the feasibility of attribute-based access control policy mining,” in IEEE 20th Int. Conf. Inf. Reuse Integrat. Data Sci. (IRI), July 2019, pp. 245-252.

M. Afshar, S. Samet and T. Hu, “An attribute based access control framework for healthcare system,” J. Phy. Conf. Ser. vol. 933, 2018, p. 012020.

Y. Xue, K. Xue, N. Gai, J. Hong, D. S. Wei and P. Hong, “An attribute-based controlled collaborative access control scheme for public cloud storage,” IEEE Tran. Inf. Forens. Security, vol. 14, pp. 2927-2942, 2019.

Y. Xu, W. Gao, Q. Zeng, G. Wang, J. Ren and Y. Zhang, “A feasible fuzzy-extended attribute-based access control technique,” Sec. Comm. Net., 2018.

N. Geetha and M. S. Anbarasi, “Role and attribute based access control model for web service composition in cloud environment,” in IEEE Int. Conf. Computat. Intelligenc. Data Sci. (ICCIDS) June 2017, pp. 1-4.

Viswanath, G., & Krishna, P. V. (2020). Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 1-8.

Li, H., Yu, C., & Wang, X. (2020). A novel 1D chaotic system for image encryption, authentication and compression in cloud. Multimedia Tools and Applications, 1-38.

Bala, B., Kamboj, L., & Luthra, P. (2018). Secure file Storage in Cloud Computing Using Hybrid Cryptography Algorithm. International Journal of Advanced Research in Computer Science, 9(2).

Olanrewaju, R. F., Abdullah, K., & Darwis, H. (2018, November). Enhancing Cloud Data Security Using Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms. In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) (pp. 18-23). IEEE.

Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., & Sastry, H. (2016). Security algorithms for cloud computing. Procedia Computer Science, 85, 535-542.

V. K. Prasad, M. Shah, N. Patel and M. Bhavsar, “Inspection of trust-based cloud using security and capacity management at an IaaS level,” Procedia Computer Science, vol. 132, no. 1, pp. 1280–1289, 2018.

P. S. Challagidad, V. S. Reshmi and M. N. Birje, “Reputation-based trust model in cloud computing,” Internet Things Cloud Computing, vol. 5, no. 1, pp. 5–12, 2017.

L. A. A. Tawalbeh, F. Ababneh, Y. Jararweh and F. AlDosari, “Trust delegation-based secure mobile cloud computing framework,” International Journal of Information and Computer Security, vol. 9, no. 2, pp. 36–48, 2017.

J. Wei, W. Liu and X. Hu, “Secure data sharing in cloud computing using revocable-storage identitybased encryption,” IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1136–1148, 2016.

K. Lee, “Comments on secure data sharing in cloud computing using revocable-storage identity-based encryption,” IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1299–1300, 2020.

B. Lang, J. Wang and Y. Liu, “Achieving flexible and self-contained data protection in cloud computing,” IEEE Access, vol. 5, pp. 1510–1523, 2017.

C. Gu, F. Luo, Y. Li and W. Ding, “Dynamic access control model based on FAHP in cloud environment,” in IEEE 4th Int. Conf. on Computer and Communications, Chengdu, China, pp. 1938–1943, 2018.

Q. Li, Y. Tian, Y. Zhang, L. Shen and J. Guo, “Efficient privacy-preserving access control of mobile multimedia data in cloud computing,” IEEE Access, vol. 7, pp. 131534–131542, 2019.

S. Zhou, G. Chen, G. Huang, J. Shi and T. Kong, “Research on multi-authority CP-ABE access control model in multi-cloud,” China Communications, vol. 17, no. 8, pp. 220–233, 2020.

Q. Zhang, S. Wang, D. Zhang, J. Wang and Y. Zhang, “Time and attribute-based dual access control and data integrity verifiable scheme in cloud computing applications,” IEEE Access, vol. 7, pp. 137594– 137607, 2019.

Liu, L., Shafiq, M., Sonawane, V. R., Murthy, M. Y. B., Reddy, P. C. S., & kumar Reddy, K. C. (2022). Spectrum trading and sharing in unmanned aerial vehicles based on distributed blockchain consortium system. Computers and Electrical Engineering, 103, 108255.

Sonawane, V., & Rao, D. R. (2015). HCMX: AN EFFICIENT HYBRID CLUSTERING APPROACH FOR MULTI-VERSION XML DOCUMENTS. Journal of Theoretical and Applied Information Technology, 82(1), 137.

Sonawane, V. R., Singh, L. L., Nunse, P. R., & Nalage, S. D. (2015, December). Visual monitoring system using simple network management protocol. In 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 197-200). IEEE.

Sonawane, V. R., & Halkarnikar, P. P. Web Site Mining Using Entropy Estimation. In 2010 International Conference on Data Storage and Data Engineering.

Downloads

Published

04.02.2023

How to Cite

Gunjal, M. B. ., & Sonawane, V. R. . (2023). Multi Authority Access Control Mechanism for Role Based Access Control for Data Security in the Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 250 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2623

Issue

Section

Research Article