Online Submission!

Open Journal Systems

Secured Resource Sharing in Cloud Storage using Policy based Access Control

S. Imavathy, R.Uma Maheswari

Abstract


Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health). In this approach, a secured cloud storage system that achieves policy-based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.


Full Text:

PDF

References


A.Squicciarini, S.Sundareswaran and D.Lin, “Preventing Information Leakage from Indexing in the Cloud," Proc. IEEE Int'l Conf. Cloud Computing, 2010.

S.Pearson , Y. Shen, and M. Mowbray," A privacy Manager for Cloud Computing," Proc. Int'l Conf. Cloud Computing (cloudcom), pp.90-106,2009

S.Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc First Int'l conf. Cloud Computing, 2009.

R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, “A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.

Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin, "Ensuring Distributed Accountability for Data Sharing in the Cloud,", IEEE Transaction on dependable a secure computing, VOL. 9, NO. 4, pg 556-568, 2012.

Chun and A. C. Bavier ,"Decentralized Trust Management and Accountability in Federated System," Proc. Ann. Hawaii Int'l Conf. System Science (HICSS), 2004.

B.Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int‟l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.

S Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, “Promoting Distributed Accountability in the Cloud,” Proc. IEEE Int‟l Conf. Cloud Computing, 2011.

Kulkarni G; Dept. of Electron. & Telecommun., Marathwada Mitra Mandal's Polytech., Pune, India, Gambhir J, Patil T and Dongare A, “A security aspects in cloud computing,” Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference

S Sajithabanu and Dr. E George Prakash Raj, Dept. of Computer Science, Bharathidasan University, Trichy, Tamilnadu, India, “Data Storage Security in Cloud ,” IJCST Vol. 2, Issue 4, Oct . - Dec. 2011

Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012

Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012

Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001

J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, May 2006




DOI: http://dx.doi.org/10.6084/ijact.v3i6.306

Refbacks

  • There are currently no refbacks.