Enhanced security-aware technique and ontology data access control in cloud computing

被引:5
|
作者
Kiran, Gangasandra Mahadevaiah [1 ]
Nalini, Narasimhaiah [2 ]
机构
[1] Shridevi Inst Engn & Technol, Dept Comp Sci Engn, Tumakuru 572106, Karnataka, India
[2] NITTE Meenakshi Inst Technol, Dept Comp Sci Engn, Bengaluru 560064, Karnataka, India
关键词
advanced encryption standard; cloud computing; data encryption standard and security-aware ontology access control; ontology data access control; DATA-STORAGE; CONTROL MODEL; MANAGEMENT;
D O I
10.1002/dac.4554
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, security and data access control are some of the major concerns in the cloud storage unit, especially in the medical field. Therefore, a security-aware mechanism and ontology-based data access control (SA-ODAC) has been developed to improve security and access control in cloud computing. The model proposed in this research work is based on two operational methods, namely, secure awareness technique (SAT) and ontology-based data access control (ODAC), to improve security and data access control in cloud computing. The SAT technique is developed to provide security for medical data in cloud computing, based on encryption, splitting and adding files, and decryption. The ODAC ontology is launched to control unauthorized persons accessing data from storage and create owner and administrator rules to allow access to data and is proposed to improve security and restrict access to data. To manage the key of the SAT technique, the secret sharing scheme is introduced in the proposed framework. The implementation of the algorithm is performed by MATLAB, and its performance is verified in terms of delay, encryption time, encryption time, and ontology processing time and is compared with role-based access control (RBAC), context-aware RBAC and context-aware task RBAC, and security analysis of advanced encryption standard and data encryption standard. Ultimately, the proposed data access control and security scheme in SA-ODAC have achieved better performance and outperform the conventional technique.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [2] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [3] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [4] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [5] Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing
    Yang, Yuli
    Peng, Xinguang
    Wan, Xiaohong
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 299 - 311
  • [6] Modeling adaptive security-aware task allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 116
  • [7] Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
    Caron, Eddy
    Le, Anh Dung
    Lefray, Arnaud
    Toinard, Christian
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 125 - 131
  • [8] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [9] SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
    Gai, Keke
    Qiu, Longfei
    Chen, Min
    Zhao, Hui
    Qiu, Meikang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [10] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34