CFP last date
20 January 2025
Reseach Article

Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control

by Avdhut Suryakant Bhise, R. N. Phursule
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 10
Year of Publication: 2017
Authors: Avdhut Suryakant Bhise, R. N. Phursule
10.5120/ijca2017914510

Avdhut Suryakant Bhise, R. N. Phursule . Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control. International Journal of Computer Applications. 168, 10 ( Jun 2017), 18-23. DOI=10.5120/ijca2017914510

@article{ 10.5120/ijca2017914510,
author = { Avdhut Suryakant Bhise, R. N. Phursule },
title = { Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 10 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number10/27911-2017914510/ },
doi = { 10.5120/ijca2017914510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:07.435884+05:30
%A Avdhut Suryakant Bhise
%A R. N. Phursule
%T Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 10
%P 18-23
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of the rising and encouraging field in Information Technology. It provides services to an organization over a network with the ability to scale up or down their service requirements. Cloud computing services are established and provided by a third party, who having the infrastructure. Cloud computing having number of benefits but the most organizations are worried for accepting it due to security issues and challenges having with the cloud. Security requirements required at the enterprise level forces to design models that solves the organizational and distributed aspects of information usage. Such models need to present the security policies intended to protect information against unauthorized access and modification stored in a cloud. The work describe the way for modeling the security requirements from the view of tasks performed in an organization by using the cryptography concepts to store data on cloud with the less time and cost for process of encryption and decryption. In this work, the RSA and AES algorithms are used for encryption and decryption of data. The role based access control model is used to provide accessibility according to the role assigned to the user. This paper has the mathematical model for the trust calculation of the user. This system gives the rights for uploading to the user when he/she is authorized by the Administrator and Owner.

References
  1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
  2. L. Zhou, V. Varadharajan, and M. Hitchens, “Enforcing role-based access control for secure data storage in the cloud,” Comput. J., vol. 54, no. 13, pp. 1675–1687, Oct. 2011.
  3. Y. Zhu, H. Hu, G.-J. Ahn, H. Wang, and S.-B. Wang, “Provably secure role-based encryption with revocation mechanism,” J. Comput. Sci. Technol., vol. 26, no. 4, pp. 697–710,2011.
  4. S. G. Akl and P. D. Taylor, “Cryptographic solution to a problem of access control in a hierarchy,” ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239–248, 1983.
  5. H. R. Hassen, A. Bouabdallah, H. Bettahar, and Y. Challal, “Key management for content access control in a hierarchy,” Comput. Netw., vol. 51, no. 11, pp. 3197– 3219, 2007.
  6. D. Ferraiolo and R. Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554–563, Bultimore, Maryland, USA, October 1992.
  7. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer,29(2):38–47, February 1996.
  8. D. Ferraiolo, R. Sandhu, S. Gavrila, R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3):224–274,August 2001.
  9. G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS’98), pages 38–48, San Francisco, California, USA, November 1998.
  10. M. Abadi and C. Fournet. Access control based on execution history. In Proceedings of NDSSS’03, pages 107–121, 2003.
  11. V. Goyal, O. Pandey, A. Sahai and B. Waters, “Attribute-based Encryption for Fine-Grained Access Control of Encrypted Data,” Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98, 2006.
  12. R. Sandhu and X. Zhang. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05), pages 147–158, Stockholm, Sweeden, June 2005.
  13. J. Bethencourt, A. Sahai and B. Waters, “Cipher text- Policy Attribute-Based Encryption,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
  14. K. Yang and X. Jia, “Attribute-based Access Control for Multi-Authority Systems in Cloud Storage,” Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems, pp. 536-545, 2012.
  15. Avdhut Suryakant Bhise and Phursule R.N., “A Review of Role based Encryption System for Secure Cloud Storage” In International Journal of Computer Application, Volume 109- No.14, January 2015.
  16. Bokefode Jayant D. and Ubale Swapnaja A., “Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model”, In International Journal of Computer Application, Volume 118-No. 12, May 2015.
  17. Singh, S preet, and Maini, Raman Comparison of Data Encryption Algorithms, International Journal of Computer science and Communication Vol. , No.1 January-June 2011, p.p. 125-127.
  18. Atul khate, Cryptography and Network Security, 2nd Ed, Tata Mcgraw hill, 2009, pp.87-2004.
  19. Davis, R., The Data Encryption Standard in Perspective,In Proc. of Communication Society magazine, IEEE, Volume 16 No 6, Nov. 1978, pp. 5-6.
  20. Daemen, J., and Rijmen, V. ,Rijndael: The Advanced Encryption Standard. Dr. Dobb's Journal, March 2001.
  21. R.L.Rivest, A.Shamir, and L.Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.
  22. Bokefode Jayant and Ubale Swapnaja, “Secure Cloud Storage System By Integrating Trust and Role Based Encryption Scheme”, in IJECS Volume 4 Issue 5 May 2015.
  23. Prof. S. A. Ubale, Dr. S. S. Apte, Comparison of ACL Based Security Models for securing resources for Windows operating system,IJSHRE Volume 2 Issue 6, Page No 63.
  24. S. D. C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Over-encryption: Management of access control evolution on outsourced data, In Proc. VLDB, Sep. 2007, pp. 123–134.
  25. C. Blundo, S. Cimato, S. D. C. Di Vimercati, A. D. Santis, S. Foresti, S. Paraboschi, et al.,Efficient key management for enforcing access control in outsourced scenarios, In SEC (IFIP), vol. 297. New York, NY, USA: Springer-Verlag, May 2009, pp. 364–375.
  26. P. Samarati and S. D. C. di Vimercati, Data protection in outsourcing scenarios: Issues and directions,” In Proc. ASIACCS, Apr. 2010, pp. 1–14.
  27. C. Gentry and A. Silverberg,, Hierarchical ID-based cryptography, in ASIACRYPT (Lecture Notes in Computer Science), vol. 2501. New York, NY, USA: Springer-Verlag, 2002, pp. 548–566.
  28. D. Boneh, X. Boyen, and E.-J. Goh, Hierarchical identity based encryption with constant size ciphertext, in EUROCRYPT (Lecture Notes in Computer Science), vol. 3494. New York, NY, USA: Springer-Verlag, May 2005, pp. 440–456.
  29. Y. Zhu, D. Ma, C. Hu, and D. Huang,,How to use attribute-based encryption to implement role-based access control in the cloud, In Proc. Int. Workshop Sec. Cloud Comput., 2013, pp. 33–40.
  30. Swapnaja A. Ubale, S. S. Apte, Bio-enable Security for Operating System by Customizing Gina, High Performance Architecture and Grid Computing Communications in Computer and Information Science Volume 169,2011, pp 179-185.
  31. Anjali D.V. and Dr. S.N. Chandrashekara, “Design and Implementation of Secure Cloud Storage System Using Hybrid Cryptography Algorithm With Role Based Access Control Model”, in IJETR Volume – 5 Issue-1, May 2016.
  32. Rashmi Nigoti, Manoj Jhuria and Dr.Shailendra Singh, “A Survey Cryptographic Algorithm for Cloud Computing”, in IJETCAS 13-123 2013.
  33. Ayushi, “A Symmetric Key Cryptographic Algorithm”, in IJCA Volume 1-No. 15, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Role Based Access Control AES RSA Cloud computing Trust Management.