Cloud computing is considered as the one of the most dominant paradigm in the field of information technology which offers
on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service
(PAAS).Provisioning all these services as it is, this cloud computing associates with number of challenges such as data security, abuse of
cloud services, malicious insider and cyber-attacks. Among all these security requirements of cloud, access control is the one of the
prominent requirement in order to avoid unauthorized access to data stored in the cloud. Main objective of this research is to review the
existing methods of cloud access control models and their variants pros and cons and to identify further related research directions for
developing an improved access control model for cloud data storage. We have presented detailed access control requirement analysis for
cloud computing and have identified important gaps, which are not fulfilled by conventional access control models. As the final outcome
of the study we have come up with an improved access control model with hybrid cryptographic schema and hybrid cloud architecture
and practical implementation of it. Finally we have tested our proposed model for security implications, performance, functionality and
data integrity to prove the validity. We have used advanced encryption standard (AES) which is a private key algorithm and Rivest-
Shamir-Adleman (RSA) public key algorithm to implement the cryptographic schema and used public and private cloud to enforce our
access control security and reliability. By validating and testing we have proved that our model can withstand against most of the cyberattacks
in real cloud environment. Thus it has improved capabilities compared with other previous access control models that we have
reviewed through the literature.
Published In:IJCSN Journal Volume 8, Issue 5
Date of Publication : October 2019
Pages : 403-405
Figures :02
Tables : --
Navod Thilakarathne :
Department of Industrial Management, Faculty of science
University of Kelaniya
Srilanka.
Public cloud data storage, Hybrid cloud, Hybrid cryptographic schema
The main objective of this research was to come up with
an improved access control model, that can be utilize in
cloud and also that can be utilize for secure cloud data
storage. Before proposing our model we have reviewed
almost every access control model in cloud and none of
the researches were targeted about the security
implications of access control in real cloud computing
environment. We have showed the experimental results of
our implemented access control model through the
perspective of performance, data integrity and security in
real cloud environment. We observed that time taken for
encryption and decryption is efficient on public cloud and
maintaining data storage in public cloud is efficient as it is
highly scalable, cost effective and provides redundancy for
the organization data. Further we observed that original
and decrypted data after encryption was same, while
checking for data integrity thus it will enhance the
reliability and assurance of our model. From the security
perspective we have observed that it's not vulnerable to
exploit and hence it provide the reliability and security for
our access control model.
[1] Aditya, k., & Ashish, D. (2013). Cryptographic Role-
Based Access Control for Secure Cloud Data Storage.
[2] Bibin, K. (2013). Access Control in Cloud Computing
International Journal of Scientific and Research
Publications Volume 3, Issue 9, September 2013.
[3] Faisal, M., & Aranganathan, S. (2015) Secure Access
Control Requirement Analysis in Cloud Computing
"Volume 3, Issue 3, March 2015.
[4] Natarajan, M. (2011) Review of Access control models
for cloud computing Jackson State University, 1400
Lynch St, Jackson, MS, USA 2011.
[5] Younis,A ., Kashif, Kifayat., & Madjid , M.(2014) An
access control model for cloud computing journal of
information security and applications 2014.
[6] Lan Zhou,Vijay Varadharajan,, Michael Hitchens
"Trust Enhanced Cryptographic Role-based Access
Control for Secure Cloud Data Storage" 2015.
[7] Punithasurya K , Jeba Priya S "Analysis of Different
Access Control Mechanism in Cloud " International
Journal of Applied Information Systems (IJAIS) - ISSN
: 2249-0868Foundation of Computer Science FCS, New
York, USA Volume 4- No.2, September 2012.
[8] Parminder Singh , Sarpreet Singh " A New Advance
Efficient RBAC to Enhance the Securit in Cloud
Computing " International Journal of Advanced
Research in Computer Science and Software
Engineering Volume 3, Issue 6, June 2013.
[9] Bokefode Jayant D ,Ubale Swapnaja A,Pingale Subhash
V,Karande Kailash J,Apate Sulabha S " Developing
Secure Cloud Storage System by Applying AES and
RSA Cryptography Algorithms with Role based Access
Control Model" Volume 118- No.12, May 2015.