A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System

  title={A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System},
  author={Balamurugan Balusamy and Parimala Venkata Krishna and G. S. Tamizh Arasi and Victor I. Chang},
  journal={Int. J. Netw. Secur.},
Cloud computing has drastically condensed the computational and storage costs of outsourced data. [] Key Method Also, we deploy the concept of Token Granting system that allows the users to verify the correctness of outsourced data without the retrieval of the respective files. The tokens are derived from the metadata containing file location that helps in the process of storage correctness verification and improvises the storage efficiency. The experimental results show SCFAP has improved storage efficiency…

Figures and Tables from this paper

Data verification using block level batch auditing on multi-cloud server
This paper proposes a flexible data auditing method using block level auditing of data distributed on multiple cloud servers that minimizes the computation, communication and storage overheads.
Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud Computing
In their scheme, the data owner could change the encryption key more easily, and not to affect other users in Cloud Storage Service system, however, some weaknesses are found.
Integrating encryption techniques for secure data storage in the cloud
This article aims to offer insights into the implementation of a novel architecture that can deliver an enhanced degree of security for outsourcing information in a cloud computing environment while involving numerous independent cloud providers and satisfies the security prerequisites of secure data sharing and can efficiently withstand security attacks.
A Credible Mechanism of Service about Data Resource in Cloud Computing
The experimental results show that it is feasible to ensure the security of service about data resource in cloud computing.
A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
This paper proposes a method that can convert any monotone circuit to an equivalent access tree and proposes a key-policy attribute-based encryption for general circuit from bilinear maps that is more efficient and expandable.
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making
An enhancement to WGAG, the action-weighted grid authorization graph (Action-WGAG), which assures a smaller number of security rule checking in some cases and a reduction of the answer time to an access control request.
Security-aware attribute-based access control for fog-based eldercare system
A security-aware Attribute-Based Access Control for eldercare system that prevents irrelevant entities from getting the elder's health information and only the medical service provider who satisfies the access structure can access the data.
IoT-based E-health system security: A vision archictecture elements and future directions
Some of the security considerations and challenges of IOT based E-Health systems are reviewed, and efficient architecture models and access control algorithms for IoT-based E-health systems are suggested.
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation
Compared with the existing MA-CP-ABE schemes, the proposed scheme is the most suitable one to enable data access control for collaborative cloud storage systems and the security and performance analysis indicates that the scheme is more secure and reasonably efficient to be applied to practical scenarios as collaborative cloudstorage systems.


Toward Secure and Dependable Storage Services in Cloud Computing
This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
This paper addresses the challenging open issue of defining and requiring access policies depend on data attributes, and allowing the data owner to delegate most of the computing tasks involved in finegrained data access control to untrusted cloud servers without disclosing the basic data contents by accomplishing and uniquely combining techniques of message Digest encryption (MD5), alternate re-encryption, and slow re-Encryption.
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
This paper proposes a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC, and presents a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud.
Toward publicly auditable secure cloud data storage services
This article proposes that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established and describes approaches and system requirements that should be brought into consideration, and outlines challenges that need to be resolved.
Privacy-Preserving Public Auditing for Secure Cloud Storage
A secure cloud storage system supporting privacy-preserving public auditing and the result is extended to enable the TPA to perform audits for multiple users simultaneously and efficiently.
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
A novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique is presented, and the paper shows how to support resource-limited mobile devices by offloading computational intensive operations to cloud servers while without compromising data privacy.
Cloud Computing Security Issues in Infrastructure as a Service
This paper presents an elaborated study of IaaS components' security and determines vulnerabilities and countermeasures, and considers Service Level Agreement very much importance.
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Ciphertext Policy Attribute Set Based Encryption (CP-ASBE) is proposed - a new form of CP-ABE - which, unlike existing CP- ABE schemes that represent user attributes as a monolithic set in keys, organizes user attributes into a recursive set based structure and allows users to impose dynamic constraints on how those attributes may be combined to satisfy a policy.
Identity-based Encryption with Outsourced Revocation in Cloud Computing
This paper sets up outsourcing addition into IBE for the first time and recommends a revocable IBE p roposal in the serveraided setting, and off-load the majority of the key making interrelated operations during key -issuing and keyupdate processes to a Key Update Cloud Service Provi der.
Attribute-based encryption for fine-grained access control of encrypted data
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.