On Security of Information Access for Multi Expert Cloud Frameworks

Shaik Naseera*, Gopichand G.**, Bhanu Prakash Ande***
* Associate Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
** Assistant Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
*** Lecturer, Department of Computer Science and Engineering, Gambella University, Gambella, Ethiopia.
Periodicity:January - June'2018
DOI : https://doi.org/10.26634/jcc.5.1.15367

Abstract

Cloud computing has three types of services, mainly they are platform as service, software as service, and Infrastructure as service. So based on whatever the requirements they have, the consumers will select different services and try to use them. Securing the information in the cloud is the better way to access it. Cloud storage will have some different roles like data owner and the service who provides. Particular data owners will not interact with the different users. Now-a-days, the information access is one of the challenging tasks in the cloud storage. Cloud owner would not have fully trusted data owners. So for avoiding the untrusted servers of data by accessing very expressive information for that purposes, they will encrypt the data and so the user will have the valid keys, on whatever they expect to access the information. So in order to validate it they need a management scheme. In this paper, the authors have proposed an advanced attribute based encryption standard system to control the scrambled information. They have used Advanced Encryption standard algorithm for the encryption of secret keys. This approach demonstrated the performance of the services efficiently in a secured cloud environment.

Keywords

Information Access, Security, Cloud Computing, Trust, Encryption, Key Management.

How to Cite this Article?

Naseera, S., Gopichand, G., Ande, B. P. (2018). On Security of Information Access for Multi Expert Cloud Frameworks, i-manager's Journal on Cloud Computing, 5(1), 7-11. https://doi.org/10.26634/jcc.5.1.15367

References

[1]. Advanced Encryption Standard (AES). (2001). Retrieved from https://csrc.nist.gov/ csrc/media/ publications/ fips/197/final/documents/fips-197.pdf
[2]. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web Application Security (pp. 17-17). Springer, Berlin, Heidelberg.
[3]. Chase, M. (2007, February). Multi-authority attribute based encr yption. In Theor y of Cr yptography Conference (pp. 515-534). Springer, Berlin, Heidelberg.
[4]. Damiani, E., Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P. (2005, November). Key management for multi-user encrypted databases. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (pp. 74-83). ACM.
[5]. Davida, G. I., Wells, D. L., & Kam, J. B. (1981). A database encryption system with subkeys. ACM Transactions on Database Systems (TODS), 6(2), 312-328.
[6]. Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia-Social and Behavioral Sciences, 2(2), 938-942.
[7]. Ireland, D. W. (2019). Using padding in encryption. Retrieved from http://www.di-mgt.com.au/cryptopad.html
[8]. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., & Fu, K. (2003, March). Plutus: Scalable Secure File Sharing on Untrusted Storage. In Fast (Vol. 3, pp. 29-42).
[9]. Sam Trenholme's Webpage. (2019). S.box in AES. Retrieved from http://www.samiam.org/s-box.html
[10]. Schneier, B. (2009). Another New AES Attack - Schneier on Security [Blog post]. Retrieved from http://www.schneier.com/blog/archives/2009/07/another _new_aes.html
[11]. The Advanced Encryption Standard (Rijndael). (2019). Retrieved from http://www.quadibloc.com/crypto/ co040401.html

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.