scholarly journals Efficient Implementation of Big Data Access Control Scheme with Privacy-Preserving Policy

In the time of big data, cloud computing, an immense measure of information can be created rapidly from different IT, non-IT related sources. Towards these big data, cloud computing, customary PC frameworks are not up to required skilled to store and process this information. Due to the adaptable and flexible figuring assets, distributed computing is a characteristic fit for putting away and preparing big data. With cloud computing, end-clients store their information into the cloud server and depend on the advanced cloud server to share their information to different clients. To share end-client's information to just approved clients, it is important to configuration access control systems as indicated by the prerequisites of end clients. When re-appropriating information into the cloud, end-clients free the physical control, virtual physical control of their information. In addition, cloud specialist co-ops are not completely trusted by end-clients, which make the entrance control additionally testing. on the off chance that the conventional access control systems (e.g., Access Control Lists) are connected, the cloud server turns into the judge to assess the entrance approach and settle on access choice. Subsequently, end-clients may stress that the cloud server may settle on wrong access choices purposefully or accidentally and uncover their information to some unapproved clients. To empower end-clients to control the entrance of their own information, a proficient and fine-grained huge information access control plot with protection saving strategy is proposed. In particular, the entire trait (as opposed to just its qualities) in the entrance strategies are scrambled. To help information decoding, encoding, a novel Attribute Bloom Filter is utilized [14][16] to assess whether a characteristic is in the entrance arrangement and find the accurate position in the entrance approach on the off chance that it is in the entrance strategy. Just the clients whose traits fulfill the entrance arrangement are qualified to unscramble the information.

Author(s):  
Abdul Razaque ◽  
Shaldanbayeva Nazerke ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive cloud computing system and use the data for inappropriate purposes that may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for Big data in cloud computing. The HUDU aims to restrict illegitimate users from accessing the cloud and data security provision. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. HUDH involves three algorithms; Advanced Encryption Standards (AES) for encryption, Attribute-Based Access Control (ABAC) for data access control, and Hybrid Intrusion Detection (HID) for unauthorized access detection. The proposed scheme is implemented using Python and Java language. Testing results demonstrate that the HUDH can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% high accuracy.


2019 ◽  
Vol 14 (3) ◽  
pp. 119 ◽  
Author(s):  
Syam Kumar Pasupuleti ◽  
P.J.A. Alphonse ◽  
Praveen Kumar Premkamal

2018 ◽  
Vol 7 (2.7) ◽  
pp. 20 ◽  
Author(s):  
Rakesh Shirsath ◽  
Dr K. V. Daya Sagar

Nowadays cloud computing is most demanding technology where computing resources are availed as per demand through Internet. Cloud computing model also brings many challenges for confidentiality, integrity, privacy of data and data access control. As cloud computing develops vigorously, an increasing number of enterprises and individuals are motivated to upload their data sources to the public cloud server for sharing. It is not entirely credible for enterprises and individuals to transfer data owing to the openness of the cloud server, so they must encrypt data before uploading and also loose direct control of data. Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem. In this paper, the issue of access control is discussed by defining traditional access policies. Attribute based access policy is analysed with its types. Finally, comparison is made among all policies with respect to various parameters.


2019 ◽  
Vol 14 (3) ◽  
pp. 119 ◽  
Author(s):  
Praveen Kumar Premkamal ◽  
Syam Kumar Pasupuleti ◽  
P.J.A. Alphonse

Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 137
Author(s):  
Abdul Razaque ◽  
Nazerke Shaldanbayeva ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.


Sign in / Sign up

Export Citation Format

Share Document