Advertisement

Real-Time Hierarchical Sensitivity Measure-Based Access Restriction for Efficient Data Retrieval in Cloud

  • A. AntonidossEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 862)

Abstract

The problem of data retrieval from cloud environment has been discussed in many articles. However, restricting the cloud users from illegal access is identified as a challenging issue. Toward the problem of access restriction, different attribute-based approaches have been discussed earlier but suffer to achieve higher performance in data retrieval also. To solve this issue, an efficient real-time hierarchical sensitivity measure-based access restriction and data retrieval algorithm is presented in this paper. The method classifies the cloud data into different classes according to their importance, and for each user taxonomy of access has been maintained. At the query time, the method estimates hierarchical sensitivity support (HSS) according to the data items being accessed. Based on the HSS on each level, a cumulative data retrieval support (CDRS) is estimated. Estimated CDRS value has been used to perform access restriction and data retrieval. The proposed method improves the performance of data retrieval and access restriction.

Keywords

Cloud data Access restriction Data retrieval Hierarchical data HSM HSS CDRS 

References

  1. 1.
    W. Teng, G. Yang, Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Cloud Comput. (99), 1 (2015).  https://doi.org/10.1109/TCC.2015.2440247CrossRefGoogle Scholar
  2. 2.
    J. Luo, A novel role-based access control model in cloud environments. IJCIS 9(1) (2016)Google Scholar
  3. 3.
    L. Xie, C. Wang, Cloud multidomain access control model based on role and trust-degree. Hindawi Electr. Comput. Eng. 2016 (2016)CrossRefGoogle Scholar
  4. 4.
    K. Yang, Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Multimedia 18(5) (2016)CrossRefGoogle Scholar
  5. 5.
    J. Kim, S. Nepal, A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Data Sci. Eng. 1(3), 149–160 (2016)CrossRefGoogle Scholar
  6. 6.
    M. Sookhaka, F. Richard Yua, Attribute-based data access control in mobile cloud computing Taxonomy and open issues. Future Gener. Comput. Syst. 72(2017), 273–287 (2017), ElsevierGoogle Scholar
  7. 7.
    B. SrinivasaRao, A framework for predicate based access control policies in infrastructure as a service cloud. IJERA 6(2), 36–44 (2016)Google Scholar
  8. 8.
    N. Paladi, Providing user security guarantees in public infrastructure clouds. IEEE Cloud Comput. 5(3) (2017)CrossRefGoogle Scholar
  9. 9.
    J. Luna, Quantitative reasoning about cloud security using service level agreements. IEEE Cloud Comput. 3(5) (2017)Google Scholar
  10. 10.
    Z. Yan, Flexible data access control based on trust and reputation in cloud computing. IEEE Cloud Comput. 5(3) (2017)CrossRefGoogle Scholar
  11. 11.
    K. Fan, Privacy protection based access control scheme in cloud-based services. IEEE China Commun. 14(3) (2017)CrossRefGoogle Scholar
  12. 12.
    Y. Zhu, Towards Temporal Access Control in Cloud Computing (IEEE, INFOCOM, 2012)CrossRefGoogle Scholar
  13. 13.
    Z. Zen, Keyword search with access control over encrypted cloud data. IEEE Sens. J. 17(3) (2017)Google Scholar
  14. 14.
    J. Wei, Secure and efficient attribute-based access control for multi-authority cloud storage. IEEE Syst. J. (99) (2017).  https://doi.org/10.1109/JSYST.2016.2633559CrossRefGoogle Scholar
  15. 15.
    J. Li, Fine-grained data access control systems with user accountability in cloud computing. Cloud-Computing (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringHindustan Institute of Technology and ScienceChennaiIndia

Personalised recommendations