Abstract
In the cloud environment, enormous amount of the data is shared on the server for the availability of access to the employees or customers related to the organization. Two main issues which are generally faced—when data is shared in cloud environment, first is authenticating the user who can access the data, and secondly, to secure the data itself. Seeing the concern, we proposed the hybrid concept which involves the role-based security as well as TPA-based security. By making use of role-based security, first we have authenticated the users using the graphical authentication in which first the image requires to be selected, then the image gets segmented into image blocks, which when selected then the pattern is formed which is used for the authentication purpose, after that when the user shares the file, then he/she specifies the role who can access the file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akkaoui, R., Hei, X., Guo, C., & Cheng, W. (2019). RBAC-HDE: On the design of a role-based access control with Smart contract for healthcare data exchange. In IEEE international conference on consumer electronics—Taiwan (ICCE-TW), Yilan, Taiwan, 2019 (pp. 1–2).
Alaria, S. K., & Kumar, A. (2018). Implementation of new cryptographic encryption approach for trust as & service (TAAS) in cloud environment. International Journal of Computers and Applications, 4(July–August)(8), (2250–1797).
Belkhiria, H., Fakhfakh, F., & Rodriguez, I. B. (2020). Resolving multi-user conflicts in a Smart building using RBAC. In IEEE 29th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE), Bayonne, France, 2020 (pp. 181–186).
Ghafoorian, M., Abbasinezhad-Mood, D., & Shakeri, H. (2019). A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Transactions on Parallel and Distributed Systems, 30(4), 778–788. https://doi.org/10.1109/TPDS.2018.2870652
Jadaun, A., Alaria, S. K., & Saini, Y. (2021). Comparative study and design light weight data security system for secure data transmission in Internet of things. International Journal on Recent and Innovation Trends in Computing and Communication, 9(3), 28–32. https://doi.org/10.17762/ijritcc.v9i3.5476
Kumar, M., Kumar, S., & Nagar, H. (2021). Enhanced text and image security using combination of DCT steganography, XOR Embedding and Arnold transform. Design Engineering, 2021(3), 732–739. ISSN: 0011-9342.
Liu, C., Cheng, S., Luo, Y., & Jiang, F. (2019). Behavior recognition based on RBAC-ensemble model. In 11th International conference on knowledge and smart technology (KST), Phuket, Thailand, 2019 (pp. 29–34).
Long, S., & Yan, L. (2019). RACAC: An approach toward RBAC and ABAC combining access control. In IEEE 5th international conference on computer and communications (ICCC), Chengdu, China, 2019 (pp. 1609–1616).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, P., Mukhija, M.K., Alaria, S.K. (2023). An Approach for Cloud Security Using TPA- and Role-Based Hybrid Concept. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Rodrigues, J.J.P.C., Ganzha, M. (eds) Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-19-1142-2_12
Download citation
DOI: https://doi.org/10.1007/978-981-19-1142-2_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1141-5
Online ISBN: 978-981-19-1142-2
eBook Packages: EngineeringEngineering (R0)