Secure Model of Access Control for Cloud Computing using Key Generation Based Public Cyclic Key Generation Method

Authors

  • Ranjeet Osari Rahul Singhai

Keywords:

Cloud Computing, Access Control, Authentication, RSA, Public Key, RMI.

Abstract

Cloud computing is a big platform of service-oriented applications over the internet. The primary access control of cloud services using login credentials for users. The growing rate of malicious software breaks the security credentials of users and theft data, and blocks the services. To prevent security threats, cloud service providers and NIST design various access control using cryptography algorithms. However, the role-based access control mechanism has limitations and breaks the security bridge between users and service providers. This paper proposed key generation-based access control methods for accessing services and data over cloud computing. The proposed key generation approach is a public key generation algorithm, a cyclic key generation algorithm. The proposed key generation methods are implemented in the Java RMI model and MYSQL database. The proposed algorithm compares with RSA based key authentication approach. The experimental results suggest that the proposed algorithm is better than the existing algorithm of access control of cloud computing.

Downloads

Download data is not yet available.

References

. Khashan, Osama Ahmed. "Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System." IEEE Access 8 (2020): 210855-210867.

. Sukmana, Muhammad IH, Kennedy A. Torkura, Hendrik Graupner, Feng Cheng, and Christoph Meinel. "Unified cloud access control model for cloud storage broker." In 2019 International Conference on Information Networking (ICOIN), pp. 60-65. IEEE, 2019.

. Xu, Shengmin, Guomin Yang, Yi Mu, and Ximeng Liu. "A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance." Future Generation Computer Systems 97 (2019): 284-294.

. Hu, Tao, Zhen Zhang, Peng Yi, Dong Liang, Ziyong Li, Quan Ren, Yuxiang Hu, and Julong Lan. "SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment." Journal of Parallel and Distributed Computing 147 (2021): 108-123.

. Qi, Saiyu, Youshui Lu, Wei Wei, and Xiaofeng Chen. "Efficient data access control with fine-grained data protection in cloud-assisted IIoT." IEEE Internet of Things Journal 8, no. 4 (2020): 2886-2899.

. Cai, Fangbo, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, and Yi Yu. "Survey of access control models and technologies for cloud computing." Cluster Computing 22, no. 3 (2019): 6111-6122.

. Sabitha, S., and M. S. Rajasree. "Multi-level on-demand access control for flexible data sharing in cloud." Cluster Computing 24, no. 2 (2021): 1455-1478.

. Prince, P. Blessed, and SP JenoLovesum, "Privacy enforced access control model for secured data handling in cloud-based pervasive health care system." SN Computer Science 1, no. 5 (2020): 1-8.

. Li, Wei, Li Xuelian, Juntao Gao, and Hai Yu Wang. "Design of secure authenticated key management protocol for cloud computing environments." IEEE Transactions on Dependable and Secure Computing (2019).

. Inampudi, Govardhana Rao, KurraMalliah, and S. Ramachandram. "Key Management for protection of health care Data of Multi-user using Access control in Cloud Environment." In 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), pp. 1-8. IEEE, 2019.

. Kayes, A. S. M., Wenny Rahayu, Tharam Dillon, Elizabeth Chang, and Jun Han. "Context-aware access control with imprecise context characterization for cloud-based data resources." Future Generation Computer Systems 93 (2019): 237-255.

. Sangeetha, M., P. Vijayakarthik, S. Dhanasekaran, and B. S. Murugan. "Fine grained access control using H-KCABE in cloud storage." Materials Today: Proceedings 37 (2021): 2735-2737.

. Wazid, Mohammad, Ashok Kumar Das, Neeraj Kumar, and Athanasios V. Vasilakos. "Design of secure key management and user authentication scheme for fog computing services." Future Generation Computer Systems 91 (2019): 475-492.

. Priyanka, J., and M. Ramakrishna. "Performance analysis of attribute based encryption and cloud health data security." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 989-994. IEEE, 2020.

. Khashan, Osama Ahmed. "Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System." IEEE Access 8 (2020): 210855-210867.

. Cheng, Cheng-Yu, Hang Liu, Li-Tse Hsieh, Edward Colbert, and Jin-Hee Cha. "Attribute-Based Access Control for Vehicular Edge Cloud Computing." In 2020 IEEE Cloud Summit, pp. 18-24. IEEE, 2020.

. Wang, Jian, Chunxiao Ye, and YangfeiOu. "Dynamic Data Access Control for Multi-Authority Cloud Storage." In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 599-608. IEEE, 2019.

. Pavithra, S., S. Ramya, and Soma Prathibha. "A survey on cloud security issues and blockchain." In 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), pp. 136-140. IEEE, 2019.

. Wazid, Mohammad, Palak Bagga, Ashok Kumar Das, Sachin Shetty, Joel JPC Rodrigues, and Youngho Park. "AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment." IEEE Internet of Things Journal 6, no. 5 (2019): 8804-8817.

. Myint, Phyo Wah Wah, Swe Zin Hlaing, and Ei Chaw Htoon. "EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data." In International Conference on Advanced Information Technologies (ICAIT), pp. 182-187. IEEE, 2020.

Downloads

Published

26.03.2024

How to Cite

Rahul Singhai, R. O. (2024). Secure Model of Access Control for Cloud Computing using Key Generation Based Public Cyclic Key Generation Method. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 424–429. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5438

Issue

Section

Research Article