Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 9)Publication Date: 2015-09-05
Authors : Harvinder Singh; Er. Amandeep Kaur;
Page : 159-162
Keywords : Cloud Storage; Access Control Model; Attribute based signatures; Multi-tier authentication; Graphical authentication;
Abstract
Cloud computing is an emerging, on-demand and internet- based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. The cloud platforms are consisted of a larger number of servers along with networking and security appliances connected together. The heavier amounts of data are stored on these cloud platforms. The data accessibility becomes the major issue in the cloud platforms. The existing access control models are based on the Mandatory access control (MAC), Role based access control (RBAC), Rule based access control (RB-RBAC) and Provenance based access control (PBAC), etc. or offered in the various combinations for the effective data access handling on the cloud platforms. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication and performs decentralized key management. In the proposed scheme, the cloud verifies the authenticity of the user without knowing the users identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against replay attacks. The communication, computation and storage overheads are comparable to centralized approaches. The proposed model will ensure the security, data privacy and rich-user experience by the proposed access model.
Other Latest Articles
- Problems of GNSS and 4G Wireless Networks
- Multi-Level Cryptographic Key Sharing For Secure Access and Authorization on Cloud Platforms - A Review
- Ultimate Tensile Strength of Heat Treated Hybrid Metal Matrix Composites
- Effectiveness of Two Distraction Techniques in Altering Behaviour Response to Pain among Children (1-3 years) Receiving Immunisation at Selected Immunisation Clinics in Mangalore
- Economic Analysis of Agroforestry of Meranti (Shorea leprosula Miq) Planted Among Oil Palm Trees as a Model for Development of Environmentally Friendly Oil Palm Plantation in The Riau Province, Indonesia
Last modified: 2021-06-30 21:53:24