International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 98 - Number 13 |
Year of Publication: 2014 |
Authors: Harsh Saki, Jitendra Dangra |
10.5120/17245-7583 |
Harsh Saki, Jitendra Dangra . TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing. International Journal of Computer Applications. 98, 13 ( July 2014), 28-33. DOI=10.5120/17245-7583
Internet and networks applications are growing very fast & hence the importance and value of the exchanged data over internet are increasing. Cloud computing technology is used to handle such scalable growth in data and the users. It supports the dynamic elasticity for increased number of application, processes, users and data. But due to its infrastructure environment various security issues raises as the data resides at remote locations. Thus the trust value of the user on such distant location is very less. Thus to do the things effectively and more securely at third party locations of cloud service provider the user must store its data in encrypted form. Information Security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security systems. Among all the encryption techniques attribute based encryption (ABE) is getting popularity day by day. As the most important factor of encryption is key thus the new key generation based on attribute based encryption mechanism is used in this work. It will control the issues related to fine grained access control and data isolation. Like most preceding mechanism, the new scheme added supports for secure and efficient dynamic operations on data blocks, counting: data update, delete and append. Thus this work proposes a novel Client end trust threshold security mechanism (TTSM) using behavior based encryption for achieving the better results. This work focuses on the application area of cloud storage platform for user satisfaction. This model gives a unique stack based solution for achieving the end user security. According to ABE the user can be able to decrypt the file on the basis of the file attribute, which is different for each file & depends on the user category. In this methodology the attribute can be identified from the user attribute table. This attribute table is dynamic in nature & whose values are passed in the table after a pre calculation of trust & user modeling. At initial level our proposed approach seems to be better secure data access in comparison to other existing methodology.