Skip to main content

Privacy-Enhanced Access Control for Providing Efficient Security in Cloud Environment

  • Conference paper
  • First Online:
Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems

Abstract

Cloud computing is the distributed collection of virtual computing devices which are used to store, process and outsource the data for the different vendors in dynamic manner. Data which is being the most valuable asset in cloud computing is vulnerable to security and privacy of data that is being shared and used in the cloud environment. Guaranteeing security and privacy for information management and query handling in the cloud is very much needed to provide privacy to user’s data which is stored in the cloud environment. Additionally, the main aim should be at protection from cyber-attacks and also preserve the information access and the authority sharing in multiuser collective cloud environments. To overcome these issues, a privacy preserving with enhanced access model has been proposed by using the Advanced Encryption Standard (AES) algorithm along with distributed key management technique which aims at securing data which is stored within a cloud environment. Moreover, a trusted third-party along with the data owners and data users is employed in the proposed system to make sure that authentication and authorization are carried out with independently without cloud server. By doing so, the proposed system can provide an efficient authentication with trusted third party and can provide privacy-enhanced access control to the data or information stored in the cloud environment. The proposed system is implemented using CloudSim with realistic simulation parameters. The simulation results justifies that the proposed system has better DoS attack detection and has better overhead in terms of computation, communication and storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SS (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. In: Wireless networks. Springer, Berlin, pp 1–22

    Google Scholar 

  2. Selvi M, Thangaramya K, Sannasi G, Kulothungan K, Khannah Nehemiah H, Kannan A (2019) An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. In: Wireless personal communications. Springer, Berlin, pp 1–16

    Google Scholar 

  3. Alanazi H, Bahaa ZB, Alaa ZA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157

    Google Scholar 

  4. Bhat B, Ali AW, Gupta A (2015) DES and AES performance evaluation. In: IEEE, International conference on computing, communication & automation, pp 887–890

    Google Scholar 

  5. Hasib A, Haque AAMM (2008) A comparative study of the performance and security ıssues of AES and RSA cryptography. In: IEEE, Third ınternational conference on convergence and hybrid ınformation technology, vol 2, pp 505–510

    Google Scholar 

  6. Ramya DR, Vijaya CV (2020) Triple DES: privacy preserving in big data healthcare. Int J Parallel Prog 48(3):515–533

    Google Scholar 

  7. Thanamani AS (2018) An efficient privacy preservation frame work for big data using IRSA. Int J Appl Eng Res 13(11):8936–8940

    Google Scholar 

  8. Aman MN, Basheer MH, Sikdar B (2018) Two-factor authentication for IoT with location information. IEEE Internet Things J 6(2):3335–3351

    Google Scholar 

  9. Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204

    Google Scholar 

  10. Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real- time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092

    Google Scholar 

  11. Cai Z, He Z, Guan X, Li Y (2016) Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Dependable Secure Comput 15(4):577–590

    Google Scholar 

  12. Sun Y, Lu R, Lin X, Shen X, Su J (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589–3603

    Google Scholar 

  13. Aijaz A, Hamid AA (2015) Cognitive machine-to-machine communications for Internet-of-Things: a protocol stack perspective. IEEE Internet Things J 2(2):103–112

    Google Scholar 

  14. Zhang W, Subramanian N, Wang G (2008) Lightweight and compromise-resilient message authentication in sensor networks. In: IEEE INFOCOM 2008—The 27th conference on computer communications, pp 1418–1426

    Google Scholar 

  15. Li J, Liu Y, Zhang Z, Li B, Liu H, Cheng J (2018) Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. In: IEEE International conference on computing, networking and communications, pp 322–326

    Google Scholar 

  16. Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, Ditta A (2020) Secure framework enhancing AES algorithm in cloud computing. Secur Commun Netw 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Selvi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rishiroop, B.B., Puneeth, P., Bhanuteja, T., Selvi, M., Santhoshkumar, S.V.N., Kannan, A. (2022). Privacy-Enhanced Access Control for Providing Efficient Security in Cloud Environment. In: Pandian, A.P., Palanisamy, R., Narayanan, M., Senjyu, T. (eds) Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems. Advances in Intelligent Systems and Computing, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-7330-6_60

Download citation

Publish with us

Policies and ethics