Data Encryption using SCT and access control using TRBAC in Cloud Computing for Big Data

@article{Dwivedi2019DataEU,
  title={Data Encryption using SCT and access control using TRBAC in Cloud Computing for Big Data},
  author={Akhilesh Dwivedi and R. P. Pant and Durgesh Pant and Martand Pande and Senam Pandey},
  journal={International Journal of Advanced Networking Applications},
  year={2019}
}
Akhilesh Dwivedi Research Scholar-IT, DSB Campus Kumaon University, Nainital dwivedian5@gmail.com R P Pant Deptt of Mathematics, DSB Campus, Kumaon University pant_rp@rediffmail.com Durgesh Pant Deptt of Science and Technology, Uttarakhand Science Education and Research Centre (USERC) durgesh.pant@gmail.com Martand Pande Free Lancer martandpande15@gmail.com Senam Pandey Free Lancer senampandey@gmail.com -------------------------------------------------------------------ABSTRACT… 
3 Citations

Figures from this paper

Privacy enforcement on subscribers data in cloud computing
TLDR
This study improves user privacy in the cloud system, using privacy with non-trusted provider (PNTP) on software and platform as a service model to give subscribers a high level of control over their data and increase the adoption of cloud computing by businesses and organizations with highly sensitive information.
A Survey on Access Controls in Cloud Computing
TLDR
Different existing security solution accessible for access control mechanism like Key-Policy constructedEncoding, Characteristic constructed Encoding, Multi-specialist, and Individuality constructed Encoded are examined.

References

SHOWING 1-10 OF 21 REFERENCES
The Low-Cost Secure Sessions of Access Control Model for Distributed Applications by Public Personal Smart Cards
TLDR
A low-cost approach of secure sessions for RBAC models is proposed, where each session ofRBAC models, including user-role-subject assignments and content-based accesses, can be protected by digital certificates generated by user own smart cards, so the security of RBAC sessions can be improved significantly.
Security enforcement using TRBAC in cloud computing
TLDR
An access control model of cloud computing is worked for which task is added to the role based access control which enhanced the security of the cloud computing and prevent access to cloud resources from unauthorized user.
A Novice Encryption Technique using Substitution Clock and Time in It (SCT)
TLDR
An algorithm that proposes advance and novice security mechanism that can defend any kind of attacks and is advantageous over the other existing algorithms that are currently being used in security areas like email and web-based security applications is developed.
A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System
TLDR
Semantic Web Services (SWS) are crucial function of the Semantic Web, traditionally focused on discovery and composition of e-services, and are an essential management and technical requirement for any efficient and effective e-payment transaction activities over semantic Web.
Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web
Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web Akhilesh Dwivedi Department of CSE, Ambedkar Institute of Technology, GGS IP University, New Delhi, India Email:
A generalized temporal role-based access control model
TLDR
This work proposes a generalized temporal role-based access control (GTRBAC) model capable of expressing a wider range of temporal constraints and allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments.
A NON-REPUDIABLE BIASED BITSTRING COMMITMENT SCHEME ON A POST QUANTUM CRYPTOSYSTEM
TLDR
This work presents a commitment scheme, which avoids hash functions by using a public-key cryptosystem based on braid conjugator search problem instead of hash functions.
Internet of Things' (IoT's) Impact on Decision Oriented Applications of Big Data Sentiment Analysis
TLDR
The core concept behind the big data sentiment analysis and framework required to handle big data with various software components are described and the grand BDSA challenges are described, as well as possible solutions to address these challenges currently.
Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web
TLDR
Cancellable biometrics and secure sketches have been introduced with the same purpose to guard the privacy of biometric templates to enhance the security and privacy of Semantic Web Services.
International Journal of Electrical and Computer Engineering (IJECE)
TLDR
This article presents a new approach of integrating parallelism into the genetic algorithm (GA), to solve the problem of routing in a large ad hoc network, the goal is to find the shortest path routing.
...
...