Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

نویسندگان

  • Harvinder Singh
  • Amandeep Kaur
چکیده

Cloud computing is an emerging, on-demand and internetbased technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. The cloud platforms are consisted of a larger number of servers along with networking and security appliances connected together. The heavier amounts of data are stored on these cloud platforms. The data accessibility becomes the major issue in the cloud platforms. The existing access control models are based on the Mandatory access control (MAC), Role based access control (RBAC), Rule based access control (RB-RBAC) and Provenance based access control (PBAC), etc. or offered in the various combinations for the effective data access handling on the cloud platforms. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication and performs decentralized key management. In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against replay attacks. The communication, computation and storage overheads are comparable to centralized approaches. The proposed model will ensure the security, data privacy and rich-user experience by the proposed access model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA

Cloud computing is simply a metaphor for the internet. User does not required knowledge, control, and ownership in the computer infrastructure. User simply access or rent the software and paying only for what they use. Advantage of cloud computing is huge like Broad network access, Cost effectiveness, Rapid elasticity, Measured services, On-Demand service, Resource pooling, Location independenc...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

3 D Security Cloud Computing using Graphical Password

Cloud computing is an emerging, on-demand and internetbased technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. To utilize these services by authorized customer and to secure a data on the cloud, it is necessary to have strict security checking system. The 3D security checking system by using the multi-level authentication tech...

متن کامل

An Efficient Data Security Mechanism in Cloud Computing Using Anonymous ID Algorithm

Cloud computing has evolved from a risky and confusing concept to a strategy that organization large and small are beginning to adopt as part of their to overall computing strategy. Cloud computing is a method of providing a set of shared computing resources that includes application, computing, storage, netorking, development and deployment platforms as well as business processes.. Research on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015