High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment
P. Jayasree1 , V. Saravanan2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1018-1022, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.10181022
Online published on Jul 31, 2018
Copyright © P. Jayasree, V. Saravanan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P. Jayasree, V. Saravanan, “High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1018-1022, 2018.
MLA Style Citation: P. Jayasree, V. Saravanan "High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment." International Journal of Computer Sciences and Engineering 6.7 (2018): 1018-1022.
APA Style Citation: P. Jayasree, V. Saravanan, (2018). High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment. International Journal of Computer Sciences and Engineering, 6(7), 1018-1022.
BibTex Style Citation:
@article{Jayasree_2018,
author = {P. Jayasree, V. Saravanan},
title = {High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1018-1022},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2554},
doi = {https://doi.org/10.26438/ijcse/v6i7.10181022}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.10181022}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2554
TI - High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - P. Jayasree, V. Saravanan
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1018-1022
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
407 | 217 downloads | 138 downloads |
Abstract
Data storing and sharing becomes a most important exceptionally attractive service supplied by cloud computing platforms because of its convenience cost effective platform and more economy. Data owner to store and outsourcing their data in the cloud and through which provide the data access to the user However, outsourcing data to a third-party administrative control entails serious security concerns. Cloud client upload Data leakage may be occur due to attacks by other users and machines in the cloud. Data leakage is and data privacy strategies an ongoing problem in the field of cloud security. The proposed work identifies security and privacy issues for secure data management in cloud environment. The proposed system provides a novel effective scheme that is named as HSDS-DP (High Secure Data Share with dynamic policy update), which is a new technique for data privacy with improved security features. The proposal has three main contributions such as, Threshold Secret Sharing, Dynamic access control update, and key managers. The proposed method Client receives public keys from all Key Managers (KM), afterwards client generate random symmetric-key for perform encryption, Symmetric key are protected by the public key. Encrypted data and keys are uploaded in the cloud. For accessing the file client should download encrypted entire key share and encrypted data file from cloud. Accessing the data client send share of key to the Key Managers, so that client will receives backs decrypted share. Proposed Dynamic Access Policy Update Scheme so client dynamically updates the data access making request to cloud server. The results reveal that proposed can be effectively used for security of outsourced data by employing key management, access control, and file dynamic access policy updating process. Our proposed scheme can prevent cheating and Data leakage problem in public cloud infrastructure.
Key-Words / Index Term
Data security, Access Control, Secret Sharing, Cloud computing, Semi-Trusted Third Party, key management
References
[1].Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information sciences 305 (2015): 357-383.
[2]. Chandankere, Rekha, and Masrath Begum. "Secure data sharing in an untrusted cloud." Int. J. Eng. Res. Appl 5 (2015): 49-54.
[3]. Chugh, Sonam, and Sateesh Kumar Peddoju. "Access control based data security in cloud computing." International Journal of Engineering Research and Applications (IJERA) 2.3 (2016): 2589-2593.
[4]. Chou, Te-Shun. "Security threats on cloud computing vulnerabilities." International Journal of Computer Science & Information Technology 5.3 (2015): 79.
[5]. H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments” IEEE Security and Privacy, Vol. 8, No. 6, 2014,pp. 24-31.
[6] . K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “Dac: Effective data access control for multi authority cloud storage systems,” Information Forensics and Security, IEEE Transactions on, vol. 8, no. 11, pp. 1790–1801, 2013.
[7] . Yang, Kan, Xiaohua Jia, and Kui Ren. "Secure and verifiable policy update outsourcing for big data access control in the cloud." IEEE Transactions on Parallel and Distributed Systems 26.12 (2015): 3461-3470.
[8] . Chen, Yanli, Lingling Song, and Geng Yang. "Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing." China Commun 13.2 (2016): 146-162.