skip to main content
10.1145/2618168.2618176acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisdocConference Proceedingsconference-collections
research-article

Security model based encryption to protect data on cloud

Published: 16 May 2014 Publication History

Abstract

Cloud Computing has been developed to deliver information technologies services on demand to organizations such as well as individual users. In this paper, we will describe an approach which proposes a security model based on Organization Role Based Access Control and encryption system. This model aims to give users a possibility to control security of their data.

References

[1]
M. Bamiah, S. Brohi, Seven Deadly Threats and Vulnerabilities in Cloud Computing, (ijaest) international journal of advanced engineering sciences and technologies vol no. 9, issue no. 1, 087--090.
[2]
S. Subashini n, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications 34, 1--11 2011.
[3]
Neena Antony, A. Alfred Raja Melvin, A Survey on Encryption Schemes in the Clouds for Access Control, International Journal of Computer Science and Management Research Vol 1 Issue 5 December 2012 ISSN 2278-733X
[4]
Qin Liu a, b, Guojun Wang a, JieWub,Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Inform. Sci. 2012.
[5]
Rohit. B, Rituparna. C, A Survey on Security Issues in Cloud Computing, Journal of Network and Computer Applications 34 1--11, 2011.
[6]
GuojunWanga, Qin Liu a, b, JieWub, MinyiGuo, Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, computers & security, 2011.
[7]
Sushmita. R, Amiya. N and Ivan. S, DACC: Distributed Access Control in Clouds,International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11,2011.
[8]
Peng. Y, Zhao. W, Xie. F, Dai. Z, Gao Y., chen dong-qing, Secure cloud storage based on cryptographic techniques, 2011.
[9]
B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy, V. PoornaChandar CP-ABE Based Encryption for Secured Cloud Storage Access, International Journal of Scientific & Engineering Research, Volume 3, Issue 9, ISSN 2229-5518, September-2012.
[10]
Zhen Liu and Zhenfu Cao, On E_ciently Transfering the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
[11]
V. Goyal, O. Pandey, A. Sahai, Brent Waters Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
[12]
Z. Liu and Z. Cao, On efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption,Cryptology ePrint Archive: Report 2010/374,Version 20100702:085423, 2010
[13]
N. Boustia, A. Mokhtari, Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach,Applied Intelligence,Volume 36, Issue 1, pp 190--207,2010.
[14]
B. Véla, C. Blanco, E. Medina, E. Marcos, Model Driven Development of Secure XML DataWarehouses: A Case Study,EDBT 2010, March 22--26, 2010.
[15]
F. Truyen, The Fast Guide to ModelDrivenArchitecture, Cephas Consulting Corp January 2006.
[16]
A. Khan, Access control in cloud computing environment, ARPN Journal of Engineering and Applied Sciences, ISSN 1819-6608, vol. 7, no. 5, may 2012.
[17]
F. Cuppens, A. Miège, OrBAC organization Based Access Control,ENST, Druide, 2004.
[18]
Frank Truyen, The Fast Guide to Model Driven Architecture, 2006.
[19]
Martin Kardoš, Matilda Drozdová Analytical Method of CIM to PIM Transformation in Model Driven Architecture (MDA), JIOS, VOL. 34, NO. 1, 2010.
[20]
P. Singh, S. Singh, A New Advance Efficient RBAC to Enhance the Security in Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, ISSN: 2277 128X, June 2013.

Cited By

View all
  • (2018)An MDA approach to secure access to data on cloud using implicit securityInternational Journal of Information and Computer Security10.1504/IJICS.2016.0781208:2(107-120)Online publication date: 16-Dec-2018
  • (2017)Data Protection in OpenStack2017 IEEE 10th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD.2017.77(560-567)Online publication date: Jun-2017
  • (2017)An intelligent character recognition method to filter spam images on cloudSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-015-1811-521:3(753-763)Online publication date: 1-Feb-2017
  • Show More Cited By

Recommendations

Reviews

Eduardo B. Fernandez

In general, encryption is applied to clouds in rather unimaginative ways, mostly to protect storage or communications, as with other distributed systems. When I saw “model-based encryption” in the title, I expected an interesting paper. This paper comes from an ACM conference, the International Conference on Information Systems and Design of Communication (ISDOC), and I assumed it would have a good level of quality. I was soon disappointed on both counts. The authors' abstract model, common information model (CIM), requires the data owner to encrypt the data, which is stored on a shared server. For authorization, the owner defines a variation of the role-based access control (RBAC) model: organization-based RBAC (ORBAC). The paper says that if the users have the right roles, they can decrypt the data; however, it does not explain how they obtain the necessary keys. Three variations of the authorization model are used, but there is no explanation of how the three models relate to each other. The authors' experiments compare their model with RBAC with respect to precision and recall. Precision and recall are used for information retrieval. They are strange measures for authorization algorithms. Authorization systems allow users to access all of the data for which they are authorized, so these measures do not apply to them. Also, it is not clear why this model is related to clouds, as indicated in the title. The English is very poor, which makes understanding even more difficult. Finally, several references are incomplete. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISDOC '14: Proceedings of the International Conference on Information Systems and Design of Communication
May 2014
192 pages
ISBN:9781450327138
DOI:10.1145/2618168
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ADETTI-IUL: Advanced IS&IT Research Center
  • EuroSIGDOC: ACM SIGDOC European chapter

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 May 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MDA
  2. ORBAC
  3. RBAC
  4. ciphertext
  5. encryption
  6. recall precision
  7. security

Qualifiers

  • Research-article

Conference

ISDOC 2014
Sponsor:
  • ADETTI-IUL
  • EuroSIGDOC

Acceptance Rates

ISDOC '14 Paper Acceptance Rate 31 of 63 submissions, 49%;
Overall Acceptance Rate 31 of 63 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)An MDA approach to secure access to data on cloud using implicit securityInternational Journal of Information and Computer Security10.1504/IJICS.2016.0781208:2(107-120)Online publication date: 16-Dec-2018
  • (2017)Data Protection in OpenStack2017 IEEE 10th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD.2017.77(560-567)Online publication date: Jun-2017
  • (2017)An intelligent character recognition method to filter spam images on cloudSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-015-1811-521:3(753-763)Online publication date: 1-Feb-2017
  • (2015)KaaSPProceedings of the 9th International Conference on Ubiquitous Information Management and Communication10.1145/2701126.2701206(1-6)Online publication date: 8-Jan-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media