CFP last date
20 June 2024
Reseach Article

TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing

by Harsh Saki, Jitendra Dangra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 13
Year of Publication: 2014
Authors: Harsh Saki, Jitendra Dangra

Harsh Saki, Jitendra Dangra . TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing. International Journal of Computer Applications. 98, 13 ( July 2014), 28-33. DOI=10.5120/17245-7583

@article{ 10.5120/17245-7583,
author = { Harsh Saki, Jitendra Dangra },
title = { TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 13 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { },
doi = { 10.5120/17245-7583 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:26:08.299264+05:30
%A Harsh Saki
%A Jitendra Dangra
%T TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 13
%P 28-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Internet and networks applications are growing very fast & hence the importance and value of the exchanged data over internet are increasing. Cloud computing technology is used to handle such scalable growth in data and the users. It supports the dynamic elasticity for increased number of application, processes, users and data. But due to its infrastructure environment various security issues raises as the data resides at remote locations. Thus the trust value of the user on such distant location is very less. Thus to do the things effectively and more securely at third party locations of cloud service provider the user must store its data in encrypted form. Information Security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security systems. Among all the encryption techniques attribute based encryption (ABE) is getting popularity day by day. As the most important factor of encryption is key thus the new key generation based on attribute based encryption mechanism is used in this work. It will control the issues related to fine grained access control and data isolation. Like most preceding mechanism, the new scheme added supports for secure and efficient dynamic operations on data blocks, counting: data update, delete and append. Thus this work proposes a novel Client end trust threshold security mechanism (TTSM) using behavior based encryption for achieving the better results. This work focuses on the application area of cloud storage platform for user satisfaction. This model gives a unique stack based solution for achieving the end user security. According to ABE the user can be able to decrypt the file on the basis of the file attribute, which is different for each file & depends on the user category. In this methodology the attribute can be identified from the user attribute table. This attribute table is dynamic in nature & whose values are passed in the table after a pre calculation of trust & user modeling. At initial level our proposed approach seems to be better secure data access in comparison to other existing methodology.

  1. Ming Li, Shucheng Yu, Yao Zheng, Student, Kui Ren, and Wenjing Lou, ?Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, in IEEE Transactions on Parallel and Distributed Systems, Vol. xx, No. xx, 2012.
  2. Changji Wang & Jianfa Luo, ?An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length in Mathematical Problems in Engineering Volume 19 , Article ID 810969, 2013. .
  3. Shucheng Yu, Cong Wang, Kui Ren & Wenjing Lou, ?Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, in Proceedings of IEEE Infocomm. , ISSN: 978-1-4244-5837-0/10, 2010.
  4. Dongyoung Koo, Junbeom Hur & Hyunsoo Yoon, ?Secure and efficient data retrieval over encrypted data using Attribute-based encryption in cloud storage, in Computers and Electrical Engineering Journal of Elsevier, ISSN:0045-7906, doi:10. 1016/j. compeleceng. 2012. 11. 002, Vol. No 39, Jan 2013. pp 34–46
  5. Guojun Wang, Qin Liu, Jie Wu & Minyi Guo, ?Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, in Computer & Security Journal of Elsevier, ISSN: 0167-4048, doi: 10. 1016/j. cose. 2011. 05. 006, Vol. No. 30, July 2011. pp 320-331
  6. Mohemed Almorsy, John Grundy & Amani S. Ibrahim, ?Collaboration-Based Cloud Computing Security Management Framework?, in 4th International Conference on Cloud Computing, IEEE Computer Society, ISSN: 978-0-7695-4460-1/11, doi:10. 1109/Cloud. 2011. 9, 2011.
  7. Pardeep Kumar, Vivek Kumar Sehgal , Durg Singh Chauhan, P. K. Gupta & Manoj Diwakar, ?Effective Ways of Secure, Private and Trusted Cloud Computing?, in International Journal of Computer Science Issues, ISSN (Online): 1694-0814, Vol. 8, Issue 3, No. 2, May 2011.
  8. Seny Kamara & Kristin Lauter, ?Cryptographic Cloud Storage?, in Microsoft Research Article at http://
  9. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi & P. Samarati, ?Encryption-based Policy Enforcement for Cloud Storage?, in IEEE Transaction, at Universita degli Studi, di Milano, 2010.
  10. Nishant Doshi & Devesh Jinwala, ?Updating Attribute in CP- ABE: A New Approach? in IJCA proceedings of ICDCIT, ISSN 0975 – 8887, 2013.
  11. Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong & Kui Ren, ?TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems?, in IEEE Transaction, 2011.
  12. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong & Shimin Chen, ?POSTER: Temporal Attribute-Based Encryption in Clouds?, in ACM Journal, ISSN:978-1-4503-0948-6/11/10, Oct 2011.
  13. Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic, ?DACC: Distributed Access Control in Clouds?, in International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-1, ISSN: 978-0-7695-4600-1/11, doi:10. 1109/TrustCom. 2011. 15, 2011.
  14. Pratap Chandra Mandal, ?Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish, Journal of Global Research in Computer Science, ISSN: 2229-371X, Volume 3, No. 8, August 2012.
  15. Craig Gentry, ?Computing Arbitrary Functions of Encrypted Data?, in ACM Journal, ISSN: 0001-0782/08/0X00, 2008.
  16. Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, and Sanjay Madria, ?An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud?, in ACM Journal, ISSN: 978-1-4503-1596-8/12/08. , 2012.
  17. Farhan Bashir Shaikh & Sajjad Haider, ?Security Threats in Cloud Computing?, in 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, United Arab Emirates Dec 2011.
  18. Farzad Sabahi, ?Cloud Computing Security Threats and Responses?, in IEEE Transaction, ISSN: 978-1-61284-486-2/11, 2011.
  19. Wentao Liu, ?Research on Cloud Computing Security Problem and Strategy?, in IEEE Transaction, ISSN: 978-1-4577-1415-3/12, 2012.
  20. Amit Sahai & Hakan Seyalioglu, ?Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption? in DARPA N11AP20006, University of Texas, Aug 2012.
Index Terms

Computer Science
Information Sciences


TTSM (Trust Threshold Security Model) ABE (Attribute Based Encryption) Cloud Computing Third Part Security Trust Model Verification Access Control