Abstract
Access control model-based security plays very crucial role in security. Cloud computing is one of the emerging and challenging fields. In the implementation explained in this paper, issues related with cloud security are tried to resolve to some extent using access control model security. Encryption, also being part of access control-based model, also incorporated for better security. Role-Based Access Control (RBAC) model along with AES–RSA encryption algorithm is implemented to achieve efficient security. The main aim of this work is to design a framework which uses the cryptography concepts to store data in cloud storage and allowing access to that data using role perspective with the smallest amount of time and cost for encryption and decryption processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhidong Shen, Li Li, Fei Yan, Xiaoping Wu. Cloud Computing System Based on Trusted Computing Platform. In Proc.International Conference on Intelligent Computation Technology and Automation, Volume 1, May 2010, pp. 942–945.
Pearson S., Benameur A. Privacy, Security and Trust Issues Arises from Cloud Computing, In Proc. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). 2010, pp. 693–702.
Rohit Bhadauria and Sugata Sanyal, A Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. International Journal of Computer Applications, Volume 47- Number 18, June 2012, 47–66.
Mohammed E.M., Ambelkadar H.S, Enhanced Data Security Model on Cloud Computing, In Proc. 8th International Conference on IEEE publication 2012, pp. 12–17.
Sang Ho. Na, Jun-Young Park, Eui–Nam Huh, Personal Cloud Computing Security Framework, In Proc. Service Computing Conference (APSSC) IEEE publication, Dec 2010, pp. 671–675.
Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE) on IEEE publication, 2012, 117–120.
R. Sandhu. The next generation of access control models: Do we need them and what should they be? In SACMAT–01, May 2001, p. 53.
Prof. S.A. Ubale and Dr. S.S. Apte, Study and Implementation of Code Access Security with .Net Framework for Windows Operating System, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 426–434.
Prof. S. A. Ubale, Dr. S. S. Apte, Comparison of ACL Based Security Models for securing resources for Windows operating system, IJSHRE Volume 2 Issue 6, p. 63.
Bokefode J.D, Ubale S. A, Apte Sulabha S, Modani D. G, Analysis of DAC MAC RBAC Access Control based Models for Security, International Journal of Computer Applications, Volume 104–No. 5, October 2014.
Daemen, J., and Rijmen, V., Rijndael: The Advanced Encryption Standard. Dr. Dobb ‘s Journal, March 2001.
R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public–Key Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.
H. L. F. Ravi S. Sandhu, Edward J. Coyne and C. E. Youman. Role-based access control models. IEEE Computer, February 1996, pp. 38–47.
W. Stallings, Cryptography and Network Security Principles and Practices Fourth Edition, Pearson Education, Prentice Hall, 2009.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Ubale, S.A., Apte, S.S., Bokefode, J.D. (2017). Developing Secure Cloud Storage System Using Access Control Models. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-1678-3_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1677-6
Online ISBN: 978-981-10-1678-3
eBook Packages: EngineeringEngineering (R0)