Skip to main content

An Approach for Cloud Security Using TPA- and Role-Based Hybrid Concept

  • Conference paper
  • First Online:
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 421))

  • 728 Accesses

Abstract

In the cloud environment, enormous amount of the data is shared on the server for the availability of access to the employees or customers related to the organization. Two main issues which are generally faced—when data is shared in cloud environment, first is authenticating the user who can access the data, and secondly, to secure the data itself. Seeing the concern, we proposed the hybrid concept which involves the role-based security as well as TPA-based security. By making use of role-based security, first we have authenticated the users using the graphical authentication in which first the image requires to be selected, then the image gets segmented into image blocks, which when selected then the pattern is formed which is used for the authentication purpose, after that when the user shares the file, then he/she specifies the role who can access the file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akkaoui, R., Hei, X., Guo, C., & Cheng, W. (2019). RBAC-HDE: On the design of a role-based access control with Smart contract for healthcare data exchange. In IEEE international conference on consumer electronics—Taiwan (ICCE-TW), Yilan, Taiwan, 2019 (pp. 1–2).

    Google Scholar 

  2. Alaria, S. K., & Kumar, A. (2018). Implementation of new cryptographic encryption approach for trust as & service (TAAS) in cloud environment. International Journal of Computers and Applications, 4(July–August)(8), (2250–1797).

    Google Scholar 

  3. Belkhiria, H., Fakhfakh, F., & Rodriguez, I. B. (2020). Resolving multi-user conflicts in a Smart building using RBAC. In IEEE 29th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE), Bayonne, France, 2020 (pp. 181–186).

    Google Scholar 

  4. Ghafoorian, M., Abbasinezhad-Mood, D., & Shakeri, H. (2019). A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Transactions on Parallel and Distributed Systems, 30(4), 778–788. https://doi.org/10.1109/TPDS.2018.2870652

    Article  Google Scholar 

  5. Jadaun, A., Alaria, S. K., & Saini, Y. (2021). Comparative study and design light weight data security system for secure data transmission in Internet of things. International Journal on Recent and Innovation Trends in Computing and Communication, 9(3), 28–32. https://doi.org/10.17762/ijritcc.v9i3.5476

  6. Kumar, M., Kumar, S., & Nagar, H. (2021). Enhanced text and image security using combination of DCT steganography, XOR Embedding and Arnold transform. Design Engineering, 2021(3), 732–739. ISSN: 0011-9342.

    Google Scholar 

  7. Liu, C., Cheng, S., Luo, Y., & Jiang, F. (2019). Behavior recognition based on RBAC-ensemble model. In 11th International conference on knowledge and smart technology (KST), Phuket, Thailand, 2019 (pp. 29–34).

    Google Scholar 

  8. Long, S., & Yan, L. (2019). RACAC: An approach toward RBAC and ABAC combining access control. In IEEE 5th international conference on computer and communications (ICCC), Chengdu, China, 2019 (pp. 1609–1616).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pooja Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, P., Mukhija, M.K., Alaria, S.K. (2023). An Approach for Cloud Security Using TPA- and Role-Based Hybrid Concept. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Rodrigues, J.J.P.C., Ganzha, M. (eds) Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-19-1142-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1142-2_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1141-5

  • Online ISBN: 978-981-19-1142-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics