Capability-based Cryptographic Data Access Control in Cloud Computing
Journal: International Journal of Advanced Networking and Applications (Vol.3, No. 03)Publication Date: 2011-11-01
Authors : Chittaranjan Hota; Sunil Sanka; Muttukrishnan Rajarajan; Srijith K. Nair;
Page : 1152-1161
Keywords : Cloud computing; Cryptography; Access control; Capability; Security;
Abstract
Cloud computing has emerged as a popular model in computing world to support processing large volumetric data using clusters of commodity computers. It is the latest effort in delivering computing resources as a service. It is used to describe both a platform and a type of application. A cloud computing platform dynamically provisions, configures, and deprovisions servers as needed. Cloud computing also describes applications that are extended to be accessible through the Internet. Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.
Other Latest Articles
- Priority Based Congestion Control Routing in Wireless Mesh Network
- Using Digital Stethoscopes in Remote Patient Assessment via Wireless Networks: the User’s Perspective
- A Review of Color Visual Cryptographic Schemes
- Multiband Vivaldi Antenna for X and Ku band Applications
- Multipath Routing Algorithms for Congestion Minimization
Last modified: 2015-12-04 15:13:38