Skip to main content

Developing Secure Cloud Storage System Using Access Control Models

  • Conference paper
  • First Online:
Proceedings of the International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 469))

Abstract

Access control model-based security plays very crucial role in security. Cloud computing is one of the emerging and challenging fields. In the implementation explained in this paper, issues related with cloud security are tried to resolve to some extent using access control model security. Encryption, also being part of access control-based model, also incorporated for better security. Role-Based Access Control (RBAC) model along with AESRSA encryption algorithm is implemented to achieve efficient security. The main aim of this work is to design a framework which uses the cryptography concepts to store data in cloud storage and allowing access to that data using role perspective with the smallest amount of time and cost for encryption and decryption processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhidong Shen, Li Li, Fei Yan, Xiaoping Wu. Cloud Computing System Based on Trusted Computing Platform. In Proc.International Conference on Intelligent Computation Technology and Automation, Volume 1, May 2010, pp. 942–945.

    Google Scholar 

  2. Pearson S., Benameur A. Privacy, Security and Trust Issues Arises from Cloud Computing, In Proc. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). 2010, pp. 693–702.

    Google Scholar 

  3. Rohit Bhadauria and Sugata Sanyal, A Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. International Journal of Computer Applications, Volume 47- Number 18, June 2012, 47–66.

    Google Scholar 

  4. Mohammed E.M., Ambelkadar H.S, Enhanced Data Security Model on Cloud Computing, In Proc. 8th International Conference on IEEE publication 2012, pp. 12–17.

    Google Scholar 

  5. Sang Ho. Na, Jun-Young Park, EuiNam Huh, Personal Cloud Computing Security Framework, In Proc. Service Computing Conference (APSSC) IEEE publication, Dec 2010, pp. 671–675.

    Google Scholar 

  6. Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE) on IEEE publication, 2012, 117–120.

    Google Scholar 

  7. R. Sandhu. The next generation of access control models: Do we need them and what should they be? In SACMAT01, May 2001, p. 53.

    Google Scholar 

  8. Prof. S.A. Ubale and Dr. S.S. Apte, Study and Implementation of Code Access Security with .Net Framework for Windows Operating System, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 426434.

    Google Scholar 

  9. Prof. S. A. Ubale, Dr. S. S. Apte, Comparison of ACL Based Security Models for securing resources for Windows operating system, IJSHRE Volume 2 Issue 6, p. 63.

    Google Scholar 

  10. Bokefode J.D, Ubale S. A, Apte Sulabha S, Modani D. G, Analysis of DAC MAC RBAC Access Control based Models for Security, International Journal of Computer Applications, Volume 104No. 5, October 2014.

    Google Scholar 

  11. Daemen, J., and Rijmen, V., Rijndael: The Advanced Encryption Standard. Dr. Dobb ‘s Journal, March 2001.

    Google Scholar 

  12. R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and PublicKey Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.

    Google Scholar 

  13. H. L. F. Ravi S. Sandhu, Edward J. Coyne and C. E. Youman. Role-based access control models. IEEE Computer, February 1996, pp. 3847.

    Google Scholar 

  14. W. Stallings, Cryptography and Network Security Principles and Practices Fourth Edition, Pearson Education, Prentice Hall, 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. A. Ubale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Ubale, S.A., Apte, S.S., Bokefode, J.D. (2017). Developing Secure Cloud Storage System Using Access Control Models. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1678-3_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1677-6

  • Online ISBN: 978-981-10-1678-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics