Secured Resource Sharing in Cloud Storage using Policy based Access Control

Authors

  • Imavathy S Assistant Professor,Dept.Of CSE, E.G.S.Pillay Engineering College,Nagapattinam,Tamilnadu,India
  • Uma Mahes wari R PG Scholar, Dept.Of CSE, E.G.S.Pillay Engineering College, Nagapattinam, Tamilnadu, India

Keywords:

cloud computing, policy, logging, auditing, data sharing

Abstract

Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health). In this approach, a secured cloud storage system that achieves policy -based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The ac cess policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built up on a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

References

A.Squicciarini, S.Sundareswaran and D.Lin, “Preventing Information Leakage from Indexing in the Cloud," Proc. IEEE Int'l Conf. Cloud Computing, 2010.

S.Pearson , Y. Shen, and M. Mowbray," A privacy Manager for Cloud Computing," Proc. Int'l Conf. Cloud Computing (cloudcom), pp.90-106,2009

S.Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc First Int'l conf. Cloud Computing, 2009.

R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu,“A Logic for Auditing Accountability in Decentralized Systems,” Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.

Smitha Sundareswaran, Anna C. Squicciarini and Dan Lin,"Ensuring Distributed Accountability for Data Sharing in the Cloud,", IEEE Transaction on dependable a secure computing, VOL. 9, NO. 4, pg 556-568, 2012.

Chun and A. C. Bavier ,"Decentralized Trust Management and Accountability in Federated System," Proc. Ann. Hawaii Int'l Conf. System Science (HICSS), 2004.

B.Crispo and G. Ruffo, “Reasoning about Accountability within Delegation,” Proc. Third Int‟l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001.

S Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, “Promoting Distributed Accountability in the Cloud,” Proc. IEEE Int‟l Conf. Cloud Computing, 2011.

Kulkarni G; Dept. of Electron. & Telecommun., Marathwada Mitra Mandal's Polytech., Pune, India, Gambhir J, Patil T and Dongare A, “A security aspects in cloud computing,” Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference

S Sajithabanu and Dr. E George Prakash Raj, Dept. of Computer Science, Bharathidasan University, Trichy, Tamilnadu, India, “Data Storage Security in Cloud ,” IJCST Vol. 2, Issue 4, Oct . - Dec. 2011

Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012

Cong Wang, Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA , Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, VOL 5, Issue 2, April-June 2012

Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int‟l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001

J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext -Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, May 2006

Downloads

Published

2024-02-26

How to Cite

Imavathy, S., & Uma Mahes wari, R. (2024). Secured Resource Sharing in Cloud Storage using Policy based Access Control. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(06), 967–972. Retrieved from https://ijact.in/index.php/j/article/view/169

Issue

Section

Original Research Article

Similar Articles

<< < 19 20 21 22 23 24 25 26 27 28 > >> 

You may also start an advanced similarity search for this article.