Abstract
Cloud computing offers a cost effective virtual infrastructure management along with storage and application-oriented services to its customers. This innovation quickly turns into a generally very widely accepted worldview for conveying administrations through web. In this way, this administration expert provider must be offer the trust and information security, on the grounds that there is a most vital and profitable and most delicate information in extremely secure using cryptographic techniques to secure the data in cloud. So for ensure the privacy of essential information, it must be secured utilizing encryptions algorithms and afterward transferring to cloud. This paper presents a novel technique for electronic distributed computing administrations utilizing two-variable validation (2FA) access control framework. The prime target of the projected framework is to guarantee a optimal security for all the actors involved in the component design of proposed authentication system. Furthermore, property based control in the framework likewise authorize cloud servers to maximum the access to those clients with the same arrangement of properties while saving client privacy. At long last, we additionally do a reproduction to show the practicability of our proposed framework. The assessment work is done by utilizing expense of communication, data transfer capacity and proficiency of the framework as an execution metric.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nelson, M.R.: Building an open cloud. Science 34(5935), 1656–1657 (2009)
Zhiguo, W., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-base solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)
Fotiou, N., Machas, A., Polyzos, G.C., Xylomenos, G.: Access control as a service for the Cloud. J. Internet Serv. Appl., 6–11 (2015). Springer
Punithasurya, K., Jeba, P.S.: Analysis of different access control mechanism in cloud. Int. J. Appl. Inf. Syst. (IJAIS) 4(2), 34–39 (2012)
Wu, R., Zhang, X., Ahn, G.-J., Sharifi, H., Xie, H.: Design and Implementation of access control as a service for IaaS cloud. Automot. Serv. Excell., 1–16 (2013)
Harika, A.V., Haleema, P.K., Subalakshmi, R.J., Iyengar, N.Ch.S.N.: Quality based solution for adaptable and scalable access control in cloud computing. Int. J. Grid Distrib. Comput. 7(6), 137–148 (2014)
Sirohi, A., Shrivastava, V.: Implementing data storage in cloud computing with HMAC encryption algorithm to improve data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(8), 678–684 (2015)
Pandey, V.K., Patel, S.K., Bedre, S.: A novel trust dependent attribute based encryption (TD-ABE) for improving the cloud security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(12), 875–881 (2014)
Rashmi, Sahoo, G., Mehfuz, S.: Securing software as a service model of cloud computing: issues and solutions. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(4), 1–11 (2013)
Oyeyinka, F.I., Omotosho, O.J.: A modified things role based access control model for securing utilities in cloud computing. Int. J. Innov. Res. Inf. Secur. (IJIRIS) 5(2), 21–25 (2015)
Kshatriya, S., Chaware, S.M.: A survey on data sharing using encryption technique in cloud computing. Int. J. Comput. Sci. Inf. Technol. 5(4), 5351–5354 (2014)
Kuppuswamy, P., A-Khalidi, S.Q.Y.: Analysis of security threats and prevention in cloud storage: review report. Int. J. Adv. Res. Eng. Appl. Sci. 3(1), 1–10 (2014)
Talib, A.M.: Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J. Inf. Secur. 6, 118–130 (2015)
Echeverría, V., Liebrock, L.M., Shin, D.: Permission management system: permission as a service in cloud computing. In: IEEE 34th Annual IEEE Conference on Computer Software and Applications Conference Workshops (COMPSACW), pp. 371–375 (2010)
Iqbal, Z., Noll, J.: Towards semantic-enhanced attribute-based access control for cloud services. In: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1223–1230 (2012)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE Proceedings on INFOCOM, pp. 1–9 (2010)
Gondkar, D.A., Kadam, V.S.: Attribute based encryption for securing personal health record on cloud. In: 2nd International Conference on Devices, Circuits and Systems (ICDCS), pp. 1–5 (2014)
Liu, Z.: A secure anonymous identity-based access control over cloud data. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 292–295 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shahabadkar, R., Sai Satyanarayana Reddy, S., Manjunath, C., Channabasava, U., Shahabadkar, K.R. (2017). Secure Framework of Authentication Mechanism Over Cloud Environment. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-57141-6_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57140-9
Online ISBN: 978-3-319-57141-6
eBook Packages: EngineeringEngineering (R0)