CFP last date
22 April 2024
Reseach Article

Modified Fine-grained Data Access Control Algorithms for File Storage Cloud

by Deepak Mehar, Gagan Vishwakarma, Y K Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 22
Year of Publication: 2015
Authors: Deepak Mehar, Gagan Vishwakarma, Y K Jain
10.5120/20467-2288

Deepak Mehar, Gagan Vishwakarma, Y K Jain . Modified Fine-grained Data Access Control Algorithms for File Storage Cloud. International Journal of Computer Applications. 116, 22 ( April 2015), 15-19. DOI=10.5120/20467-2288

@article{ 10.5120/20467-2288,
author = { Deepak Mehar, Gagan Vishwakarma, Y K Jain },
title = { Modified Fine-grained Data Access Control Algorithms for File Storage Cloud },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 22 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number22/20467-2288/ },
doi = { 10.5120/20467-2288 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:57:51.445532+05:30
%A Deepak Mehar
%A Gagan Vishwakarma
%A Y K Jain
%T Modified Fine-grained Data Access Control Algorithms for File Storage Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 22
%P 15-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is an emerging technology and it is used where computation, data manipulation and information sharing are needed. As number of Cloud users is increasing day by day, which leads to various security issues like unauthorized and unnecessary service access. To provide access control or preventing unauthorized access of data stored at Cloud Server Storage, the existing system applies cryptographic methods by sharing the decryption keys among intended authorized users or members. However, to perform these operations, existing system needs heavy computation power and resources. achieving scalability and access control simultaneously for file storage service in cloud environment is a big concern. The issues are yet not fully resolved. Our scheme proposed the solution for these issues by a mechanism that defines a package of Role based access control, Attribute based access control and security with scalable infrastructure simultaneously.

References
  1. Barrie Sosinsky "Cloud Computing Bible": 2011 by Wiley Publishing, Inc.
  2. C. Baun, M. Kunze, J. Nimis, and S. Tai "Cloud Computing (2nd edn. )" : Springer-Verlag Berlin Heidelberg 2011
  3. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing": INFOCOM, 2010 Proceedings IEEE, 2010
  4. Habiba, Mansura, Md Islam, and A. B. M. Ali. "Access Control Management for Cloud. " Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. IEEE, 2013
  5. Indrajit Ray and Indrakshi Ray "Trust-Based Access Control for Secure Cloud Computing" : K. J. Han et al. (eds. ), High Performance Cloud Auditing and Applications, DOI 10. 1007/978-1-4614-3296-8 8, © Springer Science+Business Media New York 2014
  6. Zhiguo Wan, Jun'e Liu, and Robert H. Deng "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing" : IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL
  7. Lingyu Wang, Duminda Wijesekera, and Sushil Jajodia "A Logic-based Framework for a Attribute based Access Control" : Proceedings of the 2004 ACM workshop on Formal methods in security engineering. ACM 2004.
  8. Ravi Sandhu, David Ferraiolo and Richard Kuhn "The NIST Model For Role Based access Control: Toward a Unified Standard" : ACM workshop on Role-based access control. Vol. 2000. 2000.
  9. Wang, Cong, et al. "Toward secure and dependable storage services in cloud computing. " Services Computing, IEEE Transactions on 5. 2 (2012): 220-232.
  10. Ling Li Lin Xu Jing Li Changchun Zhang "Study on the Third-party Audit in Cloud Storage Service" International Conference on Cloud and Service Computing.
  11. J. Anderson, "Computer Security Technology Planning Study," Airn Force Electronic systems Division, Report ESD-TR-73-51, 1972.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Role Based Access Control Attribute Based Access Control Scalable.