Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Improved Hierarchical Role Based Access Control Model for Cloud  
  Authors : Navod Thilakarathne
  Cite as:

 

Cloud computing is considered as the one of the most dominant paradigm in the field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Provisioning all these services as it is, this cloud computing associates with number of challenges such as data security, abuse of cloud services, malicious insider and cyber-attacks. Among all these security requirements of cloud, access control is the one of the prominent requirement in order to avoid unauthorized access to data stored in the cloud. Main objective of this research is to review the existing methods of cloud access control models and their variants pros and cons and to identify further related research directions for developing an improved access control model for cloud data storage. We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models. As the final outcome of the study we have come up with an improved access control model with hybrid cryptographic schema and hybrid cloud architecture and practical implementation of it. Finally we have tested our proposed model for security implications, performance, functionality and data integrity to prove the validity. We have used advanced encryption standard (AES) which is a private key algorithm and Rivest- Shamir-Adleman (RSA) public key algorithm to implement the cryptographic schema and used public and private cloud to enforce our access control security and reliability. By validating and testing we have proved that our model can withstand against most of the cyberattacks in real cloud environment. Thus it has improved capabilities compared with other previous access control models that we have reviewed through the literature.

 

Published In : IJCSN Journal Volume 8, Issue 5

Date of Publication : October 2019

Pages : 403-405

Figures :02

Tables : --

 

Navod Thilakarathne : Department of Industrial Management, Faculty of science University of Kelaniya Srilanka.

 

Public cloud data storage, Hybrid cloud, Hybrid cryptographic schema

The main objective of this research was to come up with an improved access control model, that can be utilize in cloud and also that can be utilize for secure cloud data storage. Before proposing our model we have reviewed almost every access control model in cloud and none of the researches were targeted about the security implications of access control in real cloud computing environment. We have showed the experimental results of our implemented access control model through the perspective of performance, data integrity and security in real cloud environment. We observed that time taken for encryption and decryption is efficient on public cloud and maintaining data storage in public cloud is efficient as it is highly scalable, cost effective and provides redundancy for the organization data. Further we observed that original and decrypted data after encryption was same, while checking for data integrity thus it will enhance the reliability and assurance of our model. From the security perspective we have observed that it's not vulnerable to exploit and hence it provide the reliability and security for our access control model.

 

[1] Aditya, k., & Ashish, D. (2013). Cryptographic Role- Based Access Control for Secure Cloud Data Storage. [2] Bibin, K. (2013). Access Control in Cloud Computing International Journal of Scientific and Research Publications Volume 3, Issue 9, September 2013. [3] Faisal, M., & Aranganathan, S. (2015) Secure Access Control Requirement Analysis in Cloud Computing "Volume 3, Issue 3, March 2015. [4] Natarajan, M. (2011) Review of Access control models for cloud computing Jackson State University, 1400 Lynch St, Jackson, MS, USA 2011. [5] Younis,A ., Kashif, Kifayat., & Madjid , M.(2014) An access control model for cloud computing journal of information security and applications 2014. [6] Lan Zhou,Vijay Varadharajan,, Michael Hitchens "Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage" 2015. [7] Punithasurya K , Jeba Priya S "Analysis of Different Access Control Mechanism in Cloud " International Journal of Applied Information Systems (IJAIS) - ISSN : 2249-0868Foundation of Computer Science FCS, New York, USA Volume 4- No.2, September 2012. [8] Parminder Singh , Sarpreet Singh " A New Advance Efficient RBAC to Enhance the Securit in Cloud Computing " International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013. [9] Bokefode Jayant D ,Ubale Swapnaja A,Pingale Subhash V,Karande Kailash J,Apate Sulabha S " Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model" Volume 118- No.12, May 2015.