CFP last date
20 December 2024
Reseach Article

Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model

by Bokefode Jayant D., Ubale Swapnaja A., Pingale Subhash V., Karande Kailash J., Apate Sulabha S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 12
Year of Publication: 2015
Authors: Bokefode Jayant D., Ubale Swapnaja A., Pingale Subhash V., Karande Kailash J., Apate Sulabha S.
10.5120/20801-3484

Bokefode Jayant D., Ubale Swapnaja A., Pingale Subhash V., Karande Kailash J., Apate Sulabha S. . Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model. International Journal of Computer Applications. 118, 12 ( May 2015), 46-52. DOI=10.5120/20801-3484

@article{ 10.5120/20801-3484,
author = { Bokefode Jayant D., Ubale Swapnaja A., Pingale Subhash V., Karande Kailash J., Apate Sulabha S. },
title = { Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 12 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number12/20801-3484/ },
doi = { 10.5120/20801-3484 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:33.116122+05:30
%A Bokefode Jayant D.
%A Ubale Swapnaja A.
%A Pingale Subhash V.
%A Karande Kailash J.
%A Apate Sulabha S.
%T Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 12
%P 46-52
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of the emerging and promising field in Information Technology. It provides services to an organization over a network with the ability to scale up or down their service requirements. Cloud computing services are established and provided by a third party, who having the infrastructure. Cloud computing having number of benefits but the most organizations are worried for accepting it due to security issues and challenges having with cloud. Security requirements required at the enterprise level forces to design models that solves the organizational and distributed aspects of information usage. Such models need to present the security policies intended to protect information against unauthorized access and modification stored in a cloud. The proposed work describes the approach for modeling the security requirements from the perspective of job functions and tasks performed in an organization by applying the cryptography concepts to store data on cloud with the smallest amount of time and cost for encryption and decryption processes. In this work, we used RSA and AES algorithm for encryption and decryption of data and role based access control model is used to provide access according to the role played by user. This paper also shows the mathematical model for calculating the trust of the user. This model gives the uploading rights to the user when he/she recommended by the Administrator and Owner when users exceeds the specified experience and trust threshold value.

References
  1. Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu. Cloud Computing System Based on Trusted Computing Platform. In Proc. International Conference on Intelligent Computation Technology and Automation, Volume 1, May 2010, pp. 942-945.
  2. Pearson S. , Benameur A. Privacy, Security and Trust Issues Arises from Cloud Computing, In Proc. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). 2010, pp. 693-702.
  3. Rohit Bhadauria and Sugata Sanyal, A Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. International Journal of Computer Applications, Volume 47- Number 18, June 2012, 47-66.
  4. Mohammed E. M. , Ambelkadar H. S, Enhanced Data Security Model on Cloud Computing, In Proc. 8th International Conference on IEEE publication 2012,pp. 12-17.
  5. Sang Ho. Na, Jun-Young Park, Eui- Nam Huh, Personal Cloud Computing Security Framework, In Proc. Service Computing Conference (APSSC) IEEE publication, Dec 2010,pp. 671-675.
  6. Wang, J. K. ; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE) on IEEE publication, 2012, 117-120.
  7. Bokefode J. D, Ubale S. A, Apte Sulabha S,Modani D. G, Analysis of DAC MAC RBAC Access Control based Models for Security, International Journal of Computer Applications, Volume 104 – No. 5, October 2014.
  8. B. W. Lampson. Protection, ACM SIGOPS Operating System Review, 8(1), January 1974, pp18–24.
  9. H. L. F. Ravi S. Sandhu, Edward J. Coyne and C. E. Youman. Role-based access control models. IEEE Computer, February 1996, pp. 38–47.
  10. R. Sandhu. The next generation of access control models: Do we need them and what should they be? In SACMAT'01, May 2001, page 53
  11. D. Ferraiolo and R. Kuhn. Role-based access controls. In Proc. of the 15th NIST-NCSC Naional Computer Security Conference, Baltimore, MD, October 1992, pp 554–563.
  12. R. Sandhu and Q. Munawer. The ARBAC99 model for administration of roles. In Proc. Of the 15th Annual Computer Security Applications Conference, Phoenix, Arizona, December 1999.
  13. R. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman. The ARBAC97 Model for Role-Based Administration of Roles. In Proc. of 2nd ACM Work-shop on Role Based Access Control, 1997.
  14. R. Sandhu, Q. Munawer. The RRA97 Model for Role Based Administration of Role Hierarchies. In Proc. of 3rd ACM Workshop on Role Based Access Control, 1998.
  15. W. Stallings, Cryptography and Network Security Principles and Practices Fourth Edition, Pearson Education, Prentice Hall, 2009.
  16. Tingyuan Nie, and Teng Zhang ,A Study of DES and Blowfish Encryption Algorithm, IEEE publications, 2009.
  17. Singh, S preet, and Maini, Raman Comparison of Data Encryption Algorithms,International Journal of Computer science and Communication,vol. 2,No. 1,January-June 2011,pp. 125- 127. A.
  18. Atul khate, Cryptography and Network Security, 2nd Ed, Tata Mcgraw hill, 2009, pp. 87-2004.
  19. Davis, R. , The Data Encryption Standard in Perspective,In Proc. of Communication Society magazine, IEEE, Volume 16 No 6, Nov. 1978, pp. 5-6.
  20. Daemen, J. , and Rijmen, V. ,Rijndael: The Advanced Encryption Standard. Dr. Dobb's Journal, March 2001.
  21. R. L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.
  22. Prof. S. A. Ubale and Dr. S. S. Apte, Study and Implementation of Code Access Security with . Net Framework for Windows Operating System, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 426 – 434.
  23. Prof. S. A. Ubale, Dr. S. S. Apte, Comparison of ACL Based Security Models for securing resources for Windows operating system,IJSHRE Volume 2 Issue 6, Page No 63.
  24. S. D. C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Over-encryption: Management of access control evolution on outsourced data, In Proc. VLDB, Sep. 2007, pp. 123–134.
  25. C. Blundo, S. Cimato, S. D. C. Di Vimercati, A. D. Santis, S. Foresti, S. Paraboschi, et al. ,Efficient key management for enforcing access control in outsourced scenarios, In SEC (IFIP), vol. 297. New York, NY, USA: Springer-Verlag, May 2009, pp. 364–375.
  26. P. Samarati and S. D. C. di Vimercati, Data protection in outsourcing scenarios: Issues and directions," In Proc. ASIACCS, Apr. 2010, pp. 1–14.
  27. C. Gentry and A. Silverberg,, Hierarchical ID-based cryptography, in ASIACRYPT (Lecture Notes in Computer Science), vol. 2501. New York, NY, USA: Springer-Verlag, 2002, pp. 548–566.
  28. D. Boneh, X. Boyen, and E. -J. Goh, Hierarchical identity based encryption with constant size ciphertext, in EUROCRYPT (Lecture Notes in Computer Science), vol. 3494. New York, NY, USA: Springer-Verlag, May 2005, pp. 440–456.
  29. L. Zhou, V. Varadharajan, and M. Hitchens, Enforcing role-based access control for secure data storage in the cloud, In Comput. J. , vol. 54, no. 13, Oct. 2011, pp. 1675–1687.
  30. Y. Zhu, H. Hu, G. -J. Ahn, H. Wang, and S. -B. Wang,Provably secure role-based encryption with revocation mechanism, J. Comput. Sci. Technol. , vol. 26, no. 4,2011, pp. 697–710.
  31. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data,In Proc. ACM Conf. Comput. Commun. Sec. , Oct. /Nov. 2006, pp. 89–98.
  32. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, In Proc. IEEE INFOCOM, Mar. 2010, pp. 534–542.
  33. Y. Zhu, D. Ma, C. Hu, and D. Huang,,How to use attribute-based encryption to implement role-based access control in the cloud,In Proc. Int. Workshop Sec. Cloud Comput. , 2013, pp. 33–40.
  34. Swapnaja A. Ubale, S. S. Apte, Bio-enable Security for Operating System by Customizing Gina, High Performance Architecture and Grid Computing Communications in Computer and Information Science Volume 169, 2011, pp 179-185.
Index Terms

Computer Science
Information Sciences

Keywords

Role Based Access Control AES RSA Cloud computing Trust Management.