Abstract
Along with the widespread interest in cloud computing, there are still concerns that hinder the proliferation and the adoption of cloud services. One of the main concerns is data security in cloud storage environments. Numerous research problems belonging to cloud storage security have been studied intensively before. However, addressing the three dimensions of outsourced data security (i.e., confidentiality, availability, and integrity) as a cloud service is still a challenge in cloud storage. As there is always a tradeoff between maintaining security and obtaining efficiency, it is difficult but nevertheless essential to explore how to efficiently address security challenges over dynamic cloud data. This paper proposes an integrated security model for data storage in the cloud that provides authentication, access control, auditing and data management services. A strong authentication sub-system that is based on the traditional password and the user keystroke dynamics is presented. A dynamic access control system is proposed to ensure data confidentiality in cloud computing. A public auditing system is proposed to delegate the integrity verification of outsourced data in the cloud storage to a third party auditor while maintaining the data privacy. Experimental results demonstrate the effectiveness and efficiency of the proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Auditing-as-a-Service for cloud storage. In: Intelligent Systems 2014, pp. 559–568. Springer International Publishing (2015)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Keystroke dynamics-based user authentication service for cloud computing. Concurrency Comput. Pract. Experience 28, 2567–2585 (2015)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Hierarchical attribute-role based access control for cloud computing. In: The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), pp. 381–389 (2016)
Abo‐alian, A., Badr, N.L., Tolba, M.F.: Integrity as a service for replicated data on the cloud. Concurrency Comput. Pract. Experience (2016)
Abo-Alian, A., Badr, N.L., Tolba, M.F.: Integrity verification for dynamic multi-replica data in cloud storage. Asian J. Inf. Technol. 15(6), 1056–1072 (2016)
Ramachandran, M., Chang, V.: Towards performance evaluation of cloud service providers for cloud data security. Int. J. Inf. Manage. 36(4), 618–625 (2016)
Liu, H., Ning, H., Xiong, Q., Yang, L.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26(1), 241–251 (2015)
Liu, Z., Yan, H., Li, Z.: Server-aided anonymous attribute-based authentication in cloud computing. Future Gener. Comput. Syst. 52, 61–66 (2015)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Authentication as a service for cloud computing. In: The International Conference on Internet of Things and Cloud Computing, pp. 36–42. ACM (2016)
Younis, Y., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 45–60 (2014)
Zhu, Y., Zhu, H.: Formal verification of mandatory access control for privacy cloud. In: 3rd International Conference on Computer Science and Network Technology, pp. 297–300. IEEE (2013)
Luo, J., Wang, H., Gong, X., Li, T.: A novel role-based access control model in cloud environments. Int. J. Comput. Intell. Syst. 9(1), 1–9 (2016)
Shen, J., Liu, D., Liu, Q., Wang, B., Fu, Z.: An authorized identity authentication-based data access control scheme in cloud. In: 18th International Conference on Advanced Communication Technology, pp. 56–60. IEEE (2016)
Liang, K., Au, M., Liu, J., Susilo, W., Wong, D., Yang, G., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52, 95–108 (2015)
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)
Wang, B., Li, B., Li, H.: Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Ren, Y., Shen, J., Zheng, Y., Wang, J., Chao, H.C.: Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 9, 1–10 (2015)
Shuang, T., Lin, T., Xiaoling, L., Yan, J.: An efficient method for checking the integrity of data in the cloud. China Commun. 11(9), 68–81 (2014)
Zhang, Y., Ni, J., Tao, X., Wang, Y., Yu, Y.: Provable multiple replication data possession with full dynamics for secure cloud storage. Concurrency Comput. Pract. Experience 28, 1161–1173 (2015)
Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: The 2013 International Workshop on Security in Cloud Computing, pp. 19–26. ACM (2013)
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MUR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2014)
Hassanien, A.E.: Hiding iris data for authentication of digital images using wavelet theory. Int. J. Pattern Recogn. Image Anal. 16(4), 637–643 (2006)
National Center for Biotechnology Information (2014). http://www.ncbi.nlm.nih.gov
Vural, E., Huang, J., Hou, D., Schuckers, S.: Shared research dataset to support development of keystroke authentication. In: The 2014 IEEE International Joint Conference on Biometrics, pp. 1–8. IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Abo-alian, A., Badr, N.L., Tolba, M.F. (2017). Security as a Service Model for Cloud Storage. In: Hassanien, A., Shaalan, K., Gaber, T., Azar, A., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016. AISI 2016. Advances in Intelligent Systems and Computing, vol 533. Springer, Cham. https://doi.org/10.1007/978-3-319-48308-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-48308-5_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48307-8
Online ISBN: 978-3-319-48308-5
eBook Packages: EngineeringEngineering (R0)