CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Review of the Various Optimized Access Control Techniques for Big Data in Cloud Environment

by Roslin Dayana K., Vigilson Prem M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 11
Year of Publication: 2018
Authors: Roslin Dayana K., Vigilson Prem M.
10.5120/ijca2018916124

Roslin Dayana K., Vigilson Prem M. . Review of the Various Optimized Access Control Techniques for Big Data in Cloud Environment. International Journal of Computer Applications. 179, 11 ( Jan 2018), 41-45. DOI=10.5120/ijca2018916124

@article{ 10.5120/ijca2018916124,
author = { Roslin Dayana K., Vigilson Prem M. },
title = { Review of the Various Optimized Access Control Techniques for Big Data in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 179 },
number = { 11 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number11/28848-2018916124/ },
doi = { 10.5120/ijca2018916124 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:55:06.892636+05:30
%A Roslin Dayana K.
%A Vigilson Prem M.
%T Review of the Various Optimized Access Control Techniques for Big Data in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 11
%P 41-45
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an information technology (IT) domain that enables efficient access to shared and private collection of configurable system resources. It provides higher-level services that can be very quickly provisioned at a greater rate with minimum amount of effort for management, mostly over the Internet. Due to the high complexity and huge volume, outsourcing ciphertexts to a cloud is deemed to be one of the most effective approaches for big data storage and access. Verifying the access legitimacy of a user and securely updating a ciphertext in the cloud based on a new access policy designated by the data owner are two critical challenges. The access policy update is important for enhancing security and dealing with the dynamism caused by user join and leave activities. In this paper, the two different approaches developed recently to provide the secure, verifiable and flexible access control of Big data storage in cloud are discussed to solve the above challenges. The working and drawbacks of different schemes developed in the past for the access control are also discussed.

References
  1. Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shenling Wang, Rongfang Bie. “A Secure and Verifiable Access Control Scheme for Big Data Storage in Cloud ”, IEEE Transactions on Big Data, Vol pp, issue 99, Feb 2017.
  2. Zheng Yan, Xueyun Li, Mingjun Wang, Athanasios V. Vasilakos “Flexible Data Access Control Based on Trust and Reputation in Cloud Computing”, IEEE Transactions on Cloud Computing, Vol 5, issue 3, July-Sept. 1 2017.
  3. A. Shamir, “How to share a secret”, Communications of the ACM, Vol 22, No. 11, pp. 612-613, 1979.
  4. Z.Eslami and J.Z.Ahmadabadi, “A verifiable multi-secret sharing scheme based on cellular automata”, Information Sciences, Vol 180, No. 15, pp. 2889-2894, 2010. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. M. H. Dehkordi and S. Mashhadi, “New efficient and practical verifiable multi-secret sharing schemes,” Information Sciences, vol. 178, no. 9, pp.2262–2274, 2008.
  6. A. C´orcoles, E. Magesan, S. J. Srinivasan, A. W. Cross, M. Steffen, J. M. Gambetta, and J. M. Chow, “Demonstration of a quantum error detection code using a square lattice of four superconducting qubits”, Nature communications, vol. 6, pp. 1–10, 2015.
  7. M. Kallahalla, et al., “Plutus: Scalable secure file sharing on untrusted storage”, Proc. of the USENIX Conference on File and Storage Technologies (FAST), 2003, pp. 29–42.
  8. E. Goh, H. Shacham, N. Modadugu, D. Boneh, “Sirius: Securing untrusted storage”, Proc. of NDSS, 2003, pp. 131–145.
  9. L. Zhou, V. Varadharajan, M. Hitchens, “Achieving secure role-based access control on encrypted data in cloud storage”, IEEE Trans. on Information Forensics and Security, vol. 8, no. 12, pp. 1947-1960, 2013.
  10. S. Yu, C. Wang, K. Ren, W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing”, Proc. of the IEEE INFOCOM, 2010, pp. 534–542.
  11. G. Wang, Q. Liu, J. Wu, M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, vol. 30, no. 5, pp. 320–331, 2011.
  12. S. Yu, C. Wang, K. Ren, W. Lou, “Attribute based data sharing with attribute revocation”, Proc. of the ACM ASIACCS, 2010, pp.261–270.
  13. G. Wang, Q. Liu, J. Wu, “Hierarchical attribute-based encryption fine-grained access control in cloud storage services”, Proc. of the 17th ACM CCS, 2010, pp. 735–737.
  14. M. Zhou, Y. Mu, W. Susilo, J. Yan, “Piracy-preserved access control for cloud computing”, Proc. of IEEE TrustCom11, 2011, pp.83-90.
  15. Z. Wan, J. Liu, R.H. Deng, “HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing”, IEEE Trans. on Info. Forensics & Security, vol. 7, no.2,pp.743-754,2012.
  16. Z. Yan, Trust Management in Mobile Environments – Usable and Autonomic Models, IGI Global, Hershey, Pennsylvania,2013.
  17. W. Wang, J. Han, M. Song, X. Wang, “The design of a trust and role based access control model in cloud computing”, in Proc. of 6th International Conference on Pervasive Computing and Applications,2011,pp.300-334.
  18. M. Pirretti, P. Traynor, P. McDaniel, B. Waters, “Secure attribute based systems”, Journal of Computer Security, vol.18,no.5,pp.799–837,2010.
Index Terms

Computer Science
Information Sciences

Keywords

NTRU cryptosystem RSA cryptosystem Attribute-Based Encryption (ABE) Proxy Re-Encryption (PRE) Access Control List Role Based Access Control (RBAC)