DOI QR코드

DOI QR Code

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed (Computer Science Department, Chongqing University) ;
  • Zhu, Qingsheng (Computer Science Department, Chongqing University) ;
  • Afsar, Salman (Computer Science Department, University of Agriculture Faisalabad) ;
  • Rehan, Akmal (Computer Science Department, University of Agriculture Faisalabad) ;
  • Mumtaz, Imran (Computer Science Department, University of Agriculture Faisalabad) ;
  • Ahmad, Wasi (Department of Information Technology Resource Center and Data Bank (ITRCDB), University of Agriculture Faisalabad)
  • 투고 : 2019.10.22
  • 심사 : 2019.11.16
  • 발행 : 2019.12.31

초록

The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

키워드

참고문헌

  1. Alvaro, J., & Beatritz, B. (2013). A New Cloud Computing Architecture. Journal of Computer and Applications. 2(2): 40-45.
  2. Anderson, R. (2011). Security Engineering: A Guide to Building Dependable Distributed Systems. Journal of Security Engineering. 2(1): 640-645.
  3. Avdhut, S. B. (2015). A Review of Role Based Encryption System for Secure Cloud Storage. International Journal of Computer Applications. 10(9): 975-980.
  4. Bamiah, M., Brohi, S., Chuprat S., & Brohi, N. (2012). Cloud Implementation Security Challenges. Journal of Security Engineering. 3(1): 174-178.
  5. Beaston, D., Hong, C., Zhang, M., & Feng, D.G. (2013). Cryptographic Access Control Scheme for Cloud Storage. Journal of Computer Research and Development. 4(7): 259-265.
  6. Beaty, K., Kundu, A., Naik V., & Acharya. A. (2013). Network Level Access Control Management for Cloud. IEEE International Conference on Cloud Engineering (IC2E). 98-107.
  7. Bell, D. & Lapadula. L. (2013). Secure Computer Systems: Mathematical Foundations. International Journal of Computer Applications. 6(9): 7-10. https://doi.org/10.5120/1343-1448
  8. Berman, S. (2013). Data Severe Dynamic Access Control Model. IEEE Transactions on Dependable and Secure Computing. 3(4): 221-229.
  9. Boneh, D., Boyen X., & Goh, E.J. (2005). Hierarchical Identity Based Encryption with Constant Size Cipher Text, in EUROCRYPT. New York, NY, USA: Springer Verlag. 3494: 440-556.
  10. Brucker, A., Bru, L., Kearney P., & Wolff. B. (2013). An Approach to Modular and Testable Security Models of Real World Health Care Applications. IEEE 16th ACM Symposium on Access Control Model and Technologies. 2(2): 133-142.
  11. Carroll, M., Merwe, V.D., & Kotze, P. (2011). Secure Cloud Computing Benefits, Risks and Controls. Journal of Information and Security. 6(5): 1-9.
  12. Chen, L., & Hoang, D.B., (2011). Novel Data Protection Model in Healthcare Cloud. IEEE 13th International Conference on High Performance Computing and Communications (HPCC). 550-555.
  13. Chen, D., & Zhao, H. (2012). Data Security and Privacy Protection in Cloud Computing. Computer Science and Electronic Engineering. 1(5): 647-651.
  14. Chong, A., Lai, H., & Bonti, A. (2011). Cloud Security Defense to Protect Cloud Computing. Journal of Network and Computer Applications. 34(4): 1097-1107. https://doi.org/10.1016/j.jnca.2010.06.004
  15. Crago, S. and Dunn, K., Eads, P., Hochstein, L., & Kang, M. (2011). Heterogeneous Cloud Computing. IEEE International Conference on Cluster Computing. 378-385.
  16. Ferraiolo, D., Barkley, J., & Kuhn, D. (2013). A Role Based Access Control Model. ACM Transactions on Information and System Security. 2(1): 34-64. https://doi.org/10.1145/300830.300834
  17. Green, M., Hohenberger, S., & Waters, B. (2011). Outsourcing the Decryption of ABE Cipher Texts. USENIX Security Symposium, USA. 78-83.
  18. Habiba, M., Islam, M., & Ali, A. (2013). Access Control Management for Cloud. IEEE 12th International Conference on Security and Privacy in Computing and Communications (TrustCom). 485-792.
  19. Hansten, A., Pankaj, P., & Rubal, C. W. (2012). Cloud Computing Security Issues. International Journal of Advanced Research in Computer Science and Software Engineering. 55 (21): 81-82.
  20. Hashizume, K., Rosado, D.G., & Fernandez, E. (2013). An Analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications. 4(1): 1-13. https://doi.org/10.1186/1869-0238-4-1
  21. Hocenski, Z. and Popovic, K. (2010). Cloud Security Alliance. 33rd MIPRO International Convention. 8(6): 344-349.
  22. Al-Ani, M.S. and Haddad, R. (2012). IPv4/IPv6 Transition. International Journal of Engineering Science. 4(12): 4815-4822.