Open Access   Article Go Back

Data Security in Public Cloud for Authorization

P.B. Gajeli1 , P.S. Yalagi2

  1. Department of CSE, Walchand Institute of Technology, Solapur, India.
  2. Department of CSE, Walchand Institute of Technology, Solapur, India.

Correspondence should be addressed to: pbgajeli@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 198-202, Jun-2017

Online published on Jun 30, 2017

Copyright © P.B. Gajeli, P.S. Yalagi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.B. Gajeli, P.S. Yalagi, “Data Security in Public Cloud for Authorization,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.198-202, 2017.

MLA Style Citation: P.B. Gajeli, P.S. Yalagi "Data Security in Public Cloud for Authorization." International Journal of Computer Sciences and Engineering 5.6 (2017): 198-202.

APA Style Citation: P.B. Gajeli, P.S. Yalagi, (2017). Data Security in Public Cloud for Authorization. International Journal of Computer Sciences and Engineering, 5(6), 198-202.

BibTex Style Citation:
@article{Gajeli_2017,
author = {P.B. Gajeli, P.S. Yalagi},
title = {Data Security in Public Cloud for Authorization},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {198-202},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1326},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1326
TI - Data Security in Public Cloud for Authorization
T2 - International Journal of Computer Sciences and Engineering
AU - P.B. Gajeli, P.S. Yalagi
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 198-202
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
618 405 downloads 658 downloads
  
  
           

Abstract

Most of the security solutions use routers, firewalls, and intrusion detection systems implemented to tightly control, access to networks from outside authors. Cloud computing breaks these organizational bounds. When the data is present in the cloud, it resides outside the organizational bounds. Hence, a user loses control over their data. Another problem is, most of the time users are anxious about uploading private and confidential files for online backup due to concern that the service provider might use it inappropriately. So, providing security at the required level is a major concern. The existing solution is data-centric access control solution with an enriched role-based approach in which security is focused on protecting user data regardless the cloud service provider that holds it. In this, Novel rule-based and proxy re-encryption technique are used to protect the authorization model and increase the performance. The authorization model is rule-based file access control, i.e. permissions granted based on authority rules provided by the data owner. In this existing solution, the authorization model contains limited privileges which restrict modification and deletion. The proposed systems consist of two types of data viz. Normal data and Sensitive data. The user can upload the file and select the type of data. Protecting normal data by using proxy re-encryption technique and sensitive data by using rummage technique. The rummage technique which encrypts the original data into meaningful (readable) format, hence attacker gets confused to identify encrypted data. The authorization model is rule-based file access control that contains privileges like access, modify, delete, etc.

Key-Words / Index Term

Encryption technique, Data-centric security, Cloud computing, Role-based access control, Authorization

References

[1] Juan M. Marin Perez; Gregorio Martinez Perez; Antonio F. Gomez-Skarmeta, ―SecRBAC:Secure data in the Clouds.IEEE Transactions on Services Computing, 2016.
[2] Coyne and T. R. Weil, "Abac and rbac: Scalable, flexible, and auditable access management," IT Professional, vol. 15, no. 3, pp.14–16, 2013.
[3] Lin Zhi, Wang Jing, Chen Xiao-su and Jia Lian-xing," Research on Policy-based Access Control Model", 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 978-0-7695-3610-1/09 $25.00 © 2009 IEEE ,DOI 10.1109/NSWCTC.2009.313
[4] R. S. Sandhu, P. Samarati. "Access control: principles and practice",IEEE Comrnunications, vol. 32(9), pp. 40~48, 1994.
[5] R S. Sandhu, E J. Coync, H L Fcinstcin et al. "Role-based access control models", IEEE Computer., vol. 29(2), pp.38~47, 1996.
[6] Ravi Sandhu. "Mandatory controls for database integrity" In Database Security ¬: Status and prospects. North-Holland,pp.143~150, 1990.
[7] Huang Yi-ming. "Design of an Extended Role-Based Access Control Model and Its Implementation", Journal of Computer Research and Development, vol. 40(10), pp.1521~1528, 2003.
[8] M. Green and G. Ateniese, "Identity-based proxy re-encryption,"in Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ser. ACNS `07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 288–306.
[9] Pooja B. Gajeli, Pratibha.S. Yalagi, “A Survey on Access control models and Encryption schemes” International Journal of Engineering Research and Management (IJERM) ISSN: 2349- 2058, Volume-01, Issue-01, April 2014.
[10] Wang, Z. Liu, and C. Wang, "Full secure identity-based encryption scheme with short public key size over lattices in the standard model," Intl. Journal of Computer Mathematics, pp. 1–10, 2015.
[11] A.Shamir, Identity-based cryptosystems and signature schemes, Proceedings of Crypto 1984, LNCS 196, Springer,Berlin, 1984. pp. 47–53.
[12] O. Regev, On lattice, learning with errors, random linear codes, and cryptography, Proceedings of STOC 2005, Baltimore, 2005. pp. 84–93.
[13] Chandan Kumar Behera and D. Lalitha Bhaskari, "Different Obfuscation Techniques for Code Protection", 4thInternational Conference on Eco-friendly Computing and Communication Systems, Procedia Computer Science 70 (2015) 757 – 763.
[14] Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Advances in Cryptology (CRYPTO 2001). Volume 2139 of Lecture Notes in Computer Science., Springer (2001) 213–229
[15] Jean-Maries Borello and Ludovic Me, Code Obfuscation Techniques for Metamorphic Viruses, Springer, 2008.
[16] Wroblewski., General method of program code obfuscation. In Proc. International Conference on Software Engineering Research and Practice (SERP 02), pages 153–159, 2002.
[17] Giovanni Vigna, Static Disassembly and Code Analysis, Malware Detection. Advances in Information Security, Springer, Heidelberg, vol.35, pages. 19 – 42, 2007.