Light Weight Access Control Mechanism for Mobile-based Cloud Data Storage

##plugins.themes.academic_pro.article.main##

Rajat Saxena
Somnath Dey

Abstract

Cloud computing is the fastest growing field of service provision in Information Technology (IT) industry. It provides on-demand and cost-effective services such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). In cloud environment, many security challenges have pinched out such as data security, malicious insider attack, cyber attack, and abuse of cloud services. In this paper, we have analyzed and identified the different major gaps between conventional access control schemes based on their demerits and requirements for the cloud access. We have proposed a Light-Weight Access Control (LWAC) model, which fulfills all cloud access control requirements. Our approach has ensured the secure and efficient sharing of resources among various non-trusted tenants and also has the capacity to support the different access permissions for the same user using multiple services securely. We have also implemented a prototype of our work which illustrates the efficient access control in the cloud environment. This prototype delivers the different cloud services within the distributed cloud environment. It also demonstrates the effective and secure access control to fetch multiple services for various resources within the capabilities assigned to the user. The comparative results show the genuine application of our approach within the latest distributed cloud environment.

##plugins.themes.academic_pro.article.details##

How to Cite
Rajat Saxena, & Somnath Dey. (2018). Light Weight Access Control Mechanism for Mobile-based Cloud Data Storage. International Journal of Next-Generation Computing, 9(2), 119–130. https://doi.org/10.47164/ijngc.v9i2.143

References

  1. Al-Kahtani, M., Sandhu, R., et al. 2002. A model for attribute-based user-role assignment. In Computer Security Applications Conference, 2002. Proceedings. 18th Annual. IEEE, 353- 362.
  2. Ausanka-Crues, R. 2001. Methods for access control: advances and limitations. Harvey Mudd College 301.
  3. Cloudera. 2014. Cloudera downloads get started with hadoop @ONLINE.
  4. Lampson, B. W. 1974. Protection. SIGOPS Oper. Syst. Rev. 8, 1 (Jan.), 18-24.
  5. Laurie, B. 2009. Access control (v0. 1).
  6. Ruj, S. and Saxena, R. Jan 2015. Securing cloud data. Cloud Computing with e-Science Applications, pp 41-72.
  7. Saxena, R. and Dey, S. 2014. Collaborative approach for data integrity veri cation in cloud computing. In Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings. 1-15.
  8. Saxena, R. and Dey, S. 2015. Cloud shield: E ective solution for ddos in cloud. In Internet and Distributed Computing Systems - 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings. 3-10.
  9. Saxena, R. and Dey, S. 2016. A novel access control model for cloud computing. 81-94.
  10. Saxena, R. and Dey, S. 2017. A curious collaborative approach for data integrity veri cation in cloud computing. CSI Transactions on ICT.
  11. Stinson, D., Wei, R., and Paterson, M. B. 2009. Combinatorial batch codes. Advances in Mathematics of Communications 3, 1, 13-27.
  12. Sun, L., Wang, H., Yong, J., and Wu, G. 2012. Semantic access control for cloud computing based on e-healthcare. In Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE 16th International Conference on. IEEE, 512-518.
  13. Tianyi, Z., Weidong, L., and Jiaxing, S. 2011. An ecient role based access control system for cloud computing. In Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on. IEEE, 97-102.
  14. Tsai, W.-T. and Shao, Q. 2011. Role-based access-control using reference ontology in clouds. In Autonomous Decentralized Systems (ISADS), 2011 10th International Symposium on. IEEE, 121-128.
  15. Wang, W., Han, J., Song, M., andWang, X. 2011. The design of a trust and role based access control model in cloud computing. In Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on. IEEE, 330-334.
  16. XenServer. 2014. Download xenserver 6.2 @ONLINE.