Skip to main content

Data Security in Cloud Computing Using Abe-Based Access Control

  • Chapter
  • First Online:
Architectural Wireless Networks Solutions and Security Issues

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 196))

Abstract

Business organizations and individual users are using cloud storage for storing their data and files. Cloud storage is managed by cloud service provider (CSP) being third party person to the data owners. Cloud storage consists of user's confidential data. After storing data in cloud, the owner of data cannot have control over data, where owner cannot trust the CSP because possibility of a malicious administrator. Based on this, different schemes are proposed. Security is a major concern for cloud stored data, and CSP has to provide trust to the data owner on security of the cloud stored data. In general, security to data and applications is provided through authentication and authorization. Security through authentication is provided by distributing user name and password to data users. However, the organizational user is not allowed to access all the organizational data. Authorization for accessing the data is provided by using access control models. Regular models are not enough to use the CSP based on the models uses dynamic method and proposed different models using attribute-based encryption (ABE). Earlier access control models cannot be used because of multiple disadvantages. This chapter will discuss dynamic access control model named as RA-HASBE. This model is proved to be scalable and flexible, due to sub-domain hierarchy. It is also proved to be dynamic by permitting user to access the data by risk evaluation using risk engine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hao R, Yang H, Zhou Z (2019) Driving behavior evaluation model base on big data from internet of vehicles. Int J Ambient Comput Intell (IJACI) 10(4):78–95

    Article  Google Scholar 

  2. Das SK, Sachin T (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159

    Google Scholar 

  3. Kandukuri R, Paturi VR, Rakshit A (2009) Cloud security issues. In: Proceedings of the 2009 IEEE international conference on services computing, pp 517–520

    Google Scholar 

  4. Neena Antony A. Melvin AR (2012) A survey on encryption schemes in the clouds for access control. Int J Comput Sci Manage Res 1(5):1135–1139

    Google Scholar 

  5. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Foren Secur 7(2):743–754

    Google Scholar 

  6. Kandala S, Sandhu R, Bhamidipati V (2011) An attribute based framework for risk-adaptive access control models, availability, reliability and security (ARES). In: 6th international conference, pp 236–241

    Google Scholar 

  7. Aluvalu R, Lakshmi M (2016) A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE

    Google Scholar 

  8. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98

    Google Scholar 

  9. Aluvalu, R, Lakshmi M (2015) Access control model with enhanced flexibility and scalability for cloud. In: 2015 international conference on green computing and Internet of Things (ICGCIoT). IEEE

    Google Scholar 

  10. Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, pp 735–737

    Google Scholar 

  11. Aluvalu R, Lakshmi M (2016) Risk aware hierarchical attribute set-based encryption (RA-HASBE) access control model. Annals. Comput Sci Ser 14(2)

    Google Scholar 

  12. Aluvalu R, Muddana L (2015) A survey on access control models in cloud computing. In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of India (CSI) vol 1, no 1, pp 653–664

    Google Scholar 

  13. Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security, pp 587–604

    Google Scholar 

  14. Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Proceedings of Asiacrypt, vol 2501. LNCS, pp 548–566

    Google Scholar 

  15. John B, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp 321–334

    Google Scholar 

  16. Aluvalu R, Kamliya V, Muddana L (2016) HASBE access control model with secure key distribution and efficient domain hierarchy for cloud computing. Int J Electr Comput Eng 6(2):770

    Google Scholar 

  17. Sarwar A, Khan MN (2013) A review of trust aspects in cloud computing security. Int J Cloud Comput Serv Sci (IJ-CLOSER) 2(2):116–122. . ISSN: 2089–3337

    Google Scholar 

  18. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592

    Article  Google Scholar 

  19. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616

    Article  Google Scholar 

  20. Devi D, Arun PS (2014) A design for secure data sharing in cloud. Int J Eng Res Gener Sci 2(5):72–77

    Google Scholar 

  21. Liang C, Jason C (2011) Risk-aware role-based access control. In: 7th international workshop, STM 2011, Copenhagen, Denmark, pp 140–156

    Google Scholar 

  22. Thirumaleshwari Devi B, Shitharth S (2020) An Appraisal over intrusion detection systems in cloud computing security attacks. In: 2nd International Conference on Innovative Mechanisms for Industry applications, ICIMIA -2020, ConferenceProceedings, pp 122

    Google Scholar 

  23. Shitharth S, Sangeetha PK (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA. In: Design Framework for wireless network, Lecture notes in network and systems, vol 82, issue 1, Springer, pp 41–64

    Google Scholar 

  24. Shitharth S, Shaik M, Sangeetha S, Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Infor Sec IET 14(1):1–11

    Google Scholar 

  25. Shitharth DP, Winston D (2017) An enhanced optimization algorithm for intrusion detection in SCADA network. J Comput Sec, Elsevier 70:16–26

    Google Scholar 

  26. Shitharth DP, Winston, (2016) A new probabilistic relevancy classification (PRC) based intrusion detection system (IDS) for SCADA network. J Elect Eng 16(3):278–288

    Google Scholar 

  27. Kumar, Parmar Vipul J, Aluvalu RK (2015) Key policy attribute-based encryption (KP-ABE): a review. Int J Innov Emerg Res Eng 2:49–52

    Google Scholar 

  28. Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA (2021) A novel and secure approach for quantum key distribution in a cloud computing environment. In: Balas VE, Semwal VB, Khandare A, Patil M (eds) Intelligent Computing and Networking. Lecture Notes in Networks and Systems, vol 146. Springer, Singapore

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aluvalu, R., Uma Maheswari, V., Chennam, K.K., Shitharth, S. (2021). Data Security in Cloud Computing Using Abe-Based Access Control. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0386-0_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0385-3

  • Online ISBN: 978-981-16-0386-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics