A Methodology for Assigning Access Control to Public Clouds
نویسندگان
چکیده
With the emergence of cloud computing technology and its ability to provide various services at affordable prices has become an important catalyst for many organizations to outsource their data to public cloud. The data owners might allow other users to gain access to their data. In this context, it is important to provide end to end data security to data. In this paper, our focus was on building an architecture that supports perfect communication between data owners, cloud servers and users. The users gain access to data as per the policies presented by the data owners. The data owners encrypt data and send it to cloud. The data owners also delegate access control policies to public cloud where re-encryption of data is taken place. Thus the users of the data can access data in perfectly secure environment. The experiments reveal that the proposed approach is very useful in securing outsourced data and still give access to various users based on the deleted access control policies to public cloud. ___________________________________________________________________________________________ I.INTRODUCTION Cloud computing is an emerging technology that paved way for potential commoditization of computing resources. This technology is on top of virtualization that makes the cloud offerings affordable. With the advent of mobile and hand held devices and innovations with underlying mobile technologies and the ubiquitous nature of mobiles, cloud computing expands to mobile devices as well. This led to mobile cloud computing where mobile devices are associated with cloud computing and leverage benefits of cloud. As people of all walks of life are using mobile devices, the mobility feature of the devices can have tremendous impact on usage of cloud computing. There is steady growth rate projected with respect to mobile cloud computing in future. As mobile devices are energy and Prince Kumar Piyush et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December2014, pg. 126-132 © 2014, IJCSMC All Rights Reserved 127 resource constrained, they are vulnerable to various security threats. Unless these threats are addressed, mobile cloud computing cannot be adapted easily. This paper throws light into the mobile cloud computing, its architecture, issues involved and solutions. The insights obtained through review of important papers can help in making well informed decisions with respect to mobile cloud computing and its applications in the real world. Cloud computing is the technology that realizes the dream of commoditizing computing resources in similar fashion to electricity and water. In fact cloud computing enables users to access huge computing resources. This new model of computing helps people and organizations to access computing resources in pay as you use fashion. Thus the model avoids the need for capital investment. It has got service models like Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Its deployment models include private cloud, public cloud, community cloud and hybrid cloud. Mobile Cloud Computing (MCC) is the cloud computing where mobile devices are involved. In this paper our focus in on delegating access control to public cloud. Towards this end we built a prototype application that demonstrates the proof of concept. The delegated access control makes it a suitable model in public cloud where data owners can give access to their data to multiple users. The remainder of this paper is structured as follows. Section II reviews literature on prior works. Section III presents the proposed approach. Section IV presents the prototype application and various user activities. Section V presents experimental results while section VI concludes the paper. II.RELATED WORKS From the review of literature many insights were ascertained. The insights obtained from the review of literature [1]-[10] are as follows. Cryptography is one of the techniques that are widely used in the real world for securing applications. However, cryptography when applied to cloud data dynamics yield to performance issues. Policy based content dissemination [9] is another approach that came into existence in 2010. Later access control policies came into existence. In this paper also we tried access control which is deleted to public cloud. Delegated access control is also studied in [10]. Securing dissemination of XML documents was explored in [8]. While publishing data security of data using cryptography is the focus in [7]. Access control in cloud is also explored in [6] and similar kind of research was carried out in [5]. Broadcast encryption mechanism was explored in [4] where encryption is applied to broadcasting. Oblivious attribute certificates concept was used in [3] for securing data. In similar fashion attribute based security is provided in [2] in terms of group key management. Stateful anonymous credentials were explored in [1]. In this paper our focus in on delegating access control to public cloud. Towards this end we built a prototype application that demonstrates the proof of concept. The delegated access control makes it a suitable model in public cloud where data owners can give access to their data to multiple users. III.PROPOSED ACCESS CONTROL METHODOLOGY The proposed approach towards building a system that helps in delegating access control to public cloud is described in this section. Identity provider gives identity tokens to users. With these users register with owner using identity tokens. Users also register with cloud and get secrets from both cloud and owner. Using the secrets, users can perform download and decrypt operations. Prince Kumar Piyush et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December2014, pg. 126-132 © 2014, IJCSMC All Rights Reserved 128 Figure 1 – Overview of the proposed methodology The data owner is able to decompose files and encrypt them before sending to cloud. The data owner also provides delegation policies to cloud that will help in making best access control policies. The cloud encrypts the content in order to enforce policies. IV.PROTOTYPE APPLICATION A prototype application is implemented in order to demonstrate the proof of concept. The application facilitates three kinds of users namely data owner, admin and user. They have specific functionalities as presented in Figure 2. Prince Kumar Piyush et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December2014, pg. 126-132 © 2014, IJCSMC All Rights Reserved 129 Login
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملLet’s Take it to the Clouds: The Potential of Educational Innovations, Including Blended Learning, for Capacity Building in Developing Countries
In modern decentralised health systems, district and local managers are increasingly responsible for financing, managing, and delivering healthcare. However, their lack of adequate skills and competencies are a critical barrier to improved performance of health systems. Given the financial and human resource, constraints of relying on traditional face-to-face training to upskill a large and dis...
متن کاملA service decomposition and definition model in cloud manufacturing systems using game theory focusing on cost accounting perspectives
Cloud manufacturing is a new paradigm which has been under study since 2010 and a vast body of research has been conducted on this topic. Among them, service composition problems are of utmost importance. However, most studies only focused on private clouds meaning the objective function is defined for just one component of the supply chain. This paper attempts to consider service composition p...
متن کاملPrivacy Preserving Two Layer Encryption Access Control In Public Clouds
The motivation of this paper is to propose a secure Access control scheme, for public clouds. We proposed a Privacy Preserving Two layer Encryption Access control in public clouds, which provides more privacy and security compared to the traditional approaches. Current approaches to enforce ACPs on outsourced data using selective encryption require organizations to manage all keys and encryptio...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملCloud Computing 1. Attribute Based Encryption with Privacy Preserving In Clouds
Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralize d in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. The authors take a centralized approach where a single key distribution center (KDC) distributes secret ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014