Secured Resource Sharing in Cloud Storage using Policy based Access Control
Keywords:
cloud computing, policy, logging, auditing, data sharingAbstract
Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health). In this approach, a secured cloud storage system that achieves policy -based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The ac cess policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built up on a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.
References
A.Squicciarini, S.Sundareswaran and D.Lin, “Preventing Information Leakage from Indexing in the Cloud," Proc. IEEE Int'l Conf. Cloud Computing, 2010.
S.Pearson , Y. Shen, and M. Mowbray," A privacy Manager for Cloud Computing," Proc. Int'l Conf. Cloud Computing (cloudcom), pp.90-106,2009
S.Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc First Int'l conf. Cloud Computing, 2009.
R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu,“A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin,"Ensuring Distributed Accountability for Data Sharing in the Cloud,", IEEE Transaction on dependable a secure computing, VOL. 9, NO. 4, pg 556-568, 2012.
Chun and A. C. Bavier ,"Decentralized Trust Management and Accountability in Federated System," Proc. Ann. Hawaii Int'l Conf. System Science (HICSS), 2004.
B.Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int‟l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.
S Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, “Promoting Distributed Accountability in the Cloud,” Proc. IEEE Int‟l Conf. Cloud Computing, 2011.
Kulkarni G; Dept. of Electron. & Telecommun., Marathwada Mitra Mandal's Polytech., Pune, India, Gambhir J, Patil T and Dongare A, “A security aspects in cloud computing,” Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference
S Sajithabanu and Dr. E George Prakash Raj, Dept. of Computer Science, Bharathidasan University, Trichy, Tamilnadu, India, “Data Storage Security in Cloud ,” IJCST Vol. 2, Issue 4, Oct . - Dec. 2011
Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012
Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012
Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001
J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext -Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, May 2006
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.