Enhanced security-aware technique and ontology data access control in cloud computing

被引:5
|
作者
Kiran, Gangasandra Mahadevaiah [1 ]
Nalini, Narasimhaiah [2 ]
机构
[1] Shridevi Inst Engn & Technol, Dept Comp Sci Engn, Tumakuru 572106, Karnataka, India
[2] NITTE Meenakshi Inst Technol, Dept Comp Sci Engn, Bengaluru 560064, Karnataka, India
关键词
advanced encryption standard; cloud computing; data encryption standard and security-aware ontology access control; ontology data access control; DATA-STORAGE; CONTROL MODEL; MANAGEMENT;
D O I
10.1002/dac.4554
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, security and data access control are some of the major concerns in the cloud storage unit, especially in the medical field. Therefore, a security-aware mechanism and ontology-based data access control (SA-ODAC) has been developed to improve security and access control in cloud computing. The model proposed in this research work is based on two operational methods, namely, secure awareness technique (SAT) and ontology-based data access control (ODAC), to improve security and data access control in cloud computing. The SAT technique is developed to provide security for medical data in cloud computing, based on encryption, splitting and adding files, and decryption. The ODAC ontology is launched to control unauthorized persons accessing data from storage and create owner and administrator rules to allow access to data and is proposed to improve security and restrict access to data. To manage the key of the SAT technique, the secret sharing scheme is introduced in the proposed framework. The implementation of the algorithm is performed by MATLAB, and its performance is verified in terms of delay, encryption time, encryption time, and ontology processing time and is compared with role-based access control (RBAC), context-aware RBAC and context-aware task RBAC, and security analysis of advanced encryption standard and data encryption standard. Ultimately, the proposed data access control and security scheme in SA-ODAC have achieved better performance and outperform the conventional technique.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Security-Aware Data Allocation in Multicloud Scenarios
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Piuri, Vincenzo
    Samarati, Pierangela
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2456 - 2468
  • [32] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [33] Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 140 - 145
  • [34] Security-Aware Scheduling of Embedded Control Tasks
    Lesi, Vuk
    Jovanov, Ilija
    Pajic, Miroslav
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [35] Context-Aware Access Control Model for Cloud Computing
    Zhou, Zhenji
    Wu, Lifa
    Hong, Zheng
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 1 - 12
  • [36] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    Krishnan, C. Gopala
    Julie, E. Golden
    Robinson, Y. Harold
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 9 - 26
  • [37] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    C. Gopala Krishnan
    E. Golden Julie
    Y. Harold Robinson
    Wireless Personal Communications, 2021, 120 : 9 - 26
  • [38] Security-Aware Resource Allocation in the Edge-Cloud Continuum
    Soumplis, Polyzois
    Kontos, Georgios
    Kretsis, Aristotelis
    Kokkinos, Panagiotis
    Nanos, Anastassios
    Varvarigos, Emmanouel
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 161 - 169
  • [39] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [40] Ontology-based data access control model supported with grid computing for improving security in healthcare data
    Kiran, G. M.
    Nalini, N.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (11)