期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2017
卷号:6
期号:7
页码:14224
DOI:10.15680/IJIRSET.2017.0607220
出版社:S&S Publications
摘要:Cloud computing is an internet based computing which enables sharing of services. With cloudcomputing, users can remotely store their data into the cloud and use on-demand high-quality applications. Cloudallows users to use applications without installation any application and access their personal files and application atany computer with internet or intranet access. The advantage of cloud is cost savings. The prime disadvantage issecurity. We present another Secured Access Control Using Two-Way Approach for Cloud Computing Services toachieving security in distributed cloud storage. In particular, in our proposed access control framework, a propertybased access control system is executed with the need of both a client secret key and a lightweight security device. As aclient can't access the data on the off chance that they don't hold both secrete key and OTP. Moreover, we use IdentityBased Encryption (IBE) algorithm to encrypt user data or file. IBE is an important primitive of ID-based cryptography.As such it is a type of public-key encryption in which the public key of a user is some unique information aboutthe identity of the user (e.g. a user's email address). We also apply Cauchy approach for data storage on cloud. In thisapproach first we divide (fragment) our file and then store each fragments on nodes. When user wants to uploadanother file then system checks is any fragment is similar to previous fragments. If any similar fragment is found thenCauchy approach assign pointer to new similar fragment instead of storing that fragment. With the help of our systemwe can achieve maximum security of data in distributed cloud. Likewise, characteristic based control in the frameworktoo enables the cloud server to restrict the access to those clients with the same arrangement of properties whilepreserving client protection, i.e., the cloud server just realizes that the client satisfies the required predicate, however noclue has on the precise personality of the client.
关键词:Access control; ASA; Cauchy Approach; Delfi Hellman; Fine-grained; Identity Based Encryption;RSA; Two-factor; Web services.