Abstract
Business organizations and individual users are using cloud storage for storing their data and files. Cloud storage is managed by cloud service provider (CSP) being third party person to the data owners. Cloud storage consists of user's confidential data. After storing data in cloud, the owner of data cannot have control over data, where owner cannot trust the CSP because possibility of a malicious administrator. Based on this, different schemes are proposed. Security is a major concern for cloud stored data, and CSP has to provide trust to the data owner on security of the cloud stored data. In general, security to data and applications is provided through authentication and authorization. Security through authentication is provided by distributing user name and password to data users. However, the organizational user is not allowed to access all the organizational data. Authorization for accessing the data is provided by using access control models. Regular models are not enough to use the CSP based on the models uses dynamic method and proposed different models using attribute-based encryption (ABE). Earlier access control models cannot be used because of multiple disadvantages. This chapter will discuss dynamic access control model named as RA-HASBE. This model is proved to be scalable and flexible, due to sub-domain hierarchy. It is also proved to be dynamic by permitting user to access the data by risk evaluation using risk engine.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hao R, Yang H, Zhou Z (2019) Driving behavior evaluation model base on big data from internet of vehicles. Int J Ambient Comput Intell (IJACI) 10(4):78–95
Das SK, Sachin T (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159
Kandukuri R, Paturi VR, Rakshit A (2009) Cloud security issues. In: Proceedings of the 2009 IEEE international conference on services computing, pp 517–520
Neena Antony A. Melvin AR (2012) A survey on encryption schemes in the clouds for access control. Int J Comput Sci Manage Res 1(5):1135–1139
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Foren Secur 7(2):743–754
Kandala S, Sandhu R, Bhamidipati V (2011) An attribute based framework for risk-adaptive access control models, availability, reliability and security (ARES). In: 6th international conference, pp 236–241
Aluvalu R, Lakshmi M (2016) A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, pp 89–98
Aluvalu, R, Lakshmi M (2015) Access control model with enhanced flexibility and scalability for cloud. In: 2015 international conference on green computing and Internet of Things (ICGCIoT). IEEE
Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, pp 735–737
Aluvalu R, Lakshmi M (2016) Risk aware hierarchical attribute set-based encryption (RA-HASBE) access control model. Annals. Comput Sci Ser 14(2)
Aluvalu R, Muddana L (2015) A survey on access control models in cloud computing. In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of India (CSI) vol 1, no 1, pp 653–664
Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security, pp 587–604
Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Proceedings of Asiacrypt, vol 2501. LNCS, pp 548–566
John B, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp 321–334
Aluvalu R, Kamliya V, Muddana L (2016) HASBE access control model with secure key distribution and efficient domain hierarchy for cloud computing. Int J Electr Comput Eng 6(2):770
Sarwar A, Khan MN (2013) A review of trust aspects in cloud computing security. Int J Cloud Comput Serv Sci (IJ-CLOSER) 2(2):116–122. . ISSN: 2089–3337
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616
Devi D, Arun PS (2014) A design for secure data sharing in cloud. Int J Eng Res Gener Sci 2(5):72–77
Liang C, Jason C (2011) Risk-aware role-based access control. In: 7th international workshop, STM 2011, Copenhagen, Denmark, pp 140–156
Thirumaleshwari Devi B, Shitharth S (2020) An Appraisal over intrusion detection systems in cloud computing security attacks. In: 2nd International Conference on Innovative Mechanisms for Industry applications, ICIMIA -2020, ConferenceProceedings, pp 122
Shitharth S, Sangeetha PK (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA. In: Design Framework for wireless network, Lecture notes in network and systems, vol 82, issue 1, Springer, pp 41–64
Shitharth S, Shaik M, Sangeetha S, Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Infor Sec IET 14(1):1–11
Shitharth DP, Winston D (2017) An enhanced optimization algorithm for intrusion detection in SCADA network. J Comput Sec, Elsevier 70:16–26
Shitharth DP, Winston, (2016) A new probabilistic relevancy classification (PRC) based intrusion detection system (IDS) for SCADA network. J Elect Eng 16(3):278–288
Kumar, Parmar Vipul J, Aluvalu RK (2015) Key policy attribute-based encryption (KP-ABE): a review. Int J Innov Emerg Res Eng 2:49–52
Aluvalu R, Chennam KK, Uma Maheswari V, Jabbar MA (2021) A novel and secure approach for quantum key distribution in a cloud computing environment. In: Balas VE, Semwal VB, Khandare A, Patil M (eds) Intelligent Computing and Networking. Lecture Notes in Networks and Systems, vol 146. Springer, Singapore
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Aluvalu, R., Uma Maheswari, V., Chennam, K.K., Shitharth, S. (2021). Data Security in Cloud Computing Using Abe-Based Access Control. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_4
Download citation
DOI: https://doi.org/10.1007/978-981-16-0386-0_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0385-3
Online ISBN: 978-981-16-0386-0
eBook Packages: EngineeringEngineering (R0)