Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality

Main Article Content

Subhash Gulabrao Rathod
Mangesh D. Salunke
Hemantkumar B. Jadhav
Deepika Amol Ajalkar
Dinesh Banurao Satre
Devyani Bonde

Abstract

The paper proposes a role-based secure data access control framework for cost-optimized cloud storage, addressing the challenge of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework incorporates a secure authenticity scheme to protect data during storage or transfer over the cloud. The framework leverages storage cost optimization by compressing high-resolution images and fragmenting them into multiple encrypted chunks using the owner's private key. The proposed approach offers two layers of security, ensuring that only authorized users can decrypt and reconstruct data into its original format. The implementation results depicts that the proposed scheme outperforms existing systems in various aspects, making it a reliable solution for cloud service providers to enhance data security while reducing storage costs.

Article Details

How to Cite
Rathod, S. G. ., Salunke, M. D. ., Jadhav, H. B. ., Ajalkar, D. A. ., Satre, D. B. ., & Bonde, D. . (2023). Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7s), 316–323. https://doi.org/10.17762/ijritcc.v11i7s.7005
Section
Articles

References

Katarzyna KAPUSTA, Han QIU, and Gerard MEMMI LTCI, Telecom ParisTech, Paris, France “Secure Data Sharing with Fast Access Revocation through Untrusted Clouds” 978-1-7281-1542-9/19/$31.00 ©2019 IEEE.

Li Li, Jiayong Liub “SecACS: Enabling lightweight secure auditable cloud storage with data dynamics” 2214-2126/© 2020 Elsevier Ltd. All rights reserved.

Reyhaneh Rabaninejad, Seyyed Mahdi Sedaghat, Mohamoud Ahmadian Attari, Mohammad Reza Aref “An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud” K. N. Toosi University of Technology Department of Electrical Engineering Tehran, Iran, 978-1-7281-5937-9/20/$31.00 ©2020 IEEE

Premlata Singh, Sushil Kr. Saroj “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage” Department of Computer Science & Engineering, Madan Mohan Malaviya University of Technology Gorakhpur, India 978-1-7281-5197-7/20/$31.00 ©2020 IEEE

Jian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang ?Colleage of Computer Science, Chongqing University, Chongqing, China “Improving Security Data Access Control for Multi-Authority Cloud Storage” 978-1-7281-4328-6/19/$31.00 ©2019 IEEE

Aritra Dutta, Rajesh Bose, Swamendu Kuma Chakraborty, Sandip Roy, Haraprasad Mondal, Computational science Brainware University, Kolkata India "Data Security Mechanism for Green Cloud", IEEE 2021

Ding ManJiang 1, Cao Kai 1, Wang ZengXi 2, Zhu LiPeng 3, 1. State Grid Jiangsu Tendering Co., Ltd, Nanjing, China 2. Jiangsu Electric Power Information Technology Co., Ltd, Nanjing, China 3. Global Energy Interconnection Research Institute Co., Ltd, Beijing, China, "Design of a Cloud Storage Security ncryption Algorithm for Power Bidding System", IEEE 2020

Subhash Rathod; Ratnashil N. Khobragade; Vilas M. Thakare; K.H. Walse; Sushama Pawar, Sant Gadge Baba Amravati University, Amravati, Pune, Maharashtra, India, “Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization”, IEEE 2022

Subhash G.Rathod, Dr.R.N.Khobragade , Dr.V.M.Thakare Sant Gadge Baba Amravati University, Amravati, Maharashtra, India. “Model for Compress & Secure Image Storing over Public Cloud”, Journal Of Electronics Information Technology Science And Management, 2022

YANG Zhen, WANG Wenyu, HUANG Yongfeng, and LI Xing, Department of Electronic Engineering, Tsinghua University, Beijing 100084, China “Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage” 2019 Chinese Institute of Electronics. DOI:10.1049/cje.2018.02.017 ©2019 IEEE

Subhash G. Rathod, R N khobragade, Vilas Thakare, Sushama L. Pawar, “Security for Shared Data Over Public Cloud for Maintaining Privacy”, Mathematical Statistician and Engineering Applications, 2022

Fei Chen, Fengming Meng, Tao Xiang, Hua Dai, Jianqiang Li, Jing Qin “Towards Usable Cloud Storage Auditing” 1045-9219 (c) 2020 IEEE

SI HAN, KE HAN, AND SHOUYI ZHANG Department of Science and Technology, China University of Political Science and Law, 102249 China “A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era” 2169-3536 2019 IEEE.

Leyou Zhang, Yilei Cui , and Yi Mu , Senior Member, IEEE “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing” 1937-9234 © 2019 IEEE

T. A. Mohanaprakash, Dr.J.Andrews Department of CSE, Sathyabama Institute of Science and Technology, Chennai 600119, Tamilnadu, India “Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm” 978-1-7281-1576-4/19/$31.00 ©2019 IEEE

YE TAO, PENG XU, and HAI JIN, National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab “Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage” 10.1109/ACCESS.2019.2962600, IEEE Access

Prof. Bhushan Thakre, Dr. R.M Thakre. (2017). Analysis of Modified Current Controller and its Implementation in Automotive LED. International Journal of New Practices in Management and Engineering, 6(04), 01 - 06. https://doi.org/10.17762/ijnpme.v6i04.60

Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Tengfei Yang, School of Cyber Engineering, Xidian University, Xi'an 710071, China “Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation” 978-1-5386-8088-9/19/$31.00 ©2019 IEEE

Wenxiu Ding, Member, IEEE, Rui Hu, Zheng Yan, Senior Member, IEEE, Xinren Qian, Robert H. Deng, Fellow, IEEE, Laurence T. Yang, Senior Member, IEEE, and Mianxiong Dong, Member, IEEE “An Extended Framework of Privacy-Preserving Computation with Flexible Access Control” 1932-4537 (c) 2019 IEEE

HAN YU, XIUQING LU, AND ZHENKUAN PAN, College of Computer Science and Technology, Qingdao University, Qingdao 266071, China, “An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing” r 10.1109/ACCESS. 2020 IEEE

Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis Department of Mathematics and Engineering Science, Hellenic Military Academy, Vari – 16673, Greece “Hash function design for cloud storage data auditing” 0304-3975/© 2019 Elsevier

Nureni Ayofe Azeez, Charles Van der Vyver School of Computer Science and Information Systems, Faculty of Natural and Agricultural Sciences, Vaal Triangle Campus, North-West University, South Africa. “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis” 1110-8665/2018 Production and hosting by Elsevier

Jianghong Wei , Wenfen Liu, and Xuexian Hu “Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage” IEEE SYSTEMS JOURNAL, VOL. 12, NO. 2, JUNE 2018

Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloud” 10.1109/MCC.2018. IEEE

Kaiping Xue, Senior Member, IEEE, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong “Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage” 1556-6013 (c) 2018 IEEE

Jianting Ning, Zhenfu Cao, Senior Member, IEEE, Xiaolei Dong, Kaitai Liang, Member, IEEE, Lifei Wei, and Kim-Kwang Raymond Choo, Senior Member, IEEE “CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage” 1939-1374 (c) 2017 IEEE

Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou Department of ECE Illinois Institute of Technology , Department of ECE Worcester Polytechnic Institute “Ensuring Data Storage Security in Cloud Computing” 978-1-4244-3876-1/09/$25.00 ©2009 IEEE

Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Ning Cao, and Wenjing Lou, Senior Member, IEEE, “Toward Secure and Dependable Storage Services in Cloud Computing” 1939-1374/12/$31.00 2012 IEEE

Syam Kumar P, Subramanian R Department of Computer Science, School of Engineering & Technology Pondicherry University, Puducherry-605014, India,“An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011

CONG WANG1 (Member, IEEE), BINGSHENG ZHANG2 (Member, IEEE), KUI REN2 (Senior Member, IEEE), AND JANET M. ROVEDA3 (Senior Member, IEEE) Department of Computer Science, City University of Hong Kong, Hong Kong “Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud” IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:1 NO:1 YEAR 2013

Sahoo, D. K. . (2022). A Novel Method to Improve the Detection of Glaucoma Disease Using Machine Learning. Research Journal of Computer Systems and Engineering, 3(1), 67–72. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/44

Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013

Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 1045-9219/12/$31.00 © 2012 IEEE

Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2014

HUAQUN WANG1, 2 1 Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, “Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record” 2169-3536 (c) 2018 IEEE

R.Swathi, T.Subha, Associate Professor, Department of Information Technology, Sri Sairam Engineering College, Chennai, swathi.marthandan@gmail.com, subharajan@gmail.com, “ENHANCING DATA STORAGE SECURITY IN CLOUD USING CERTIFICATELESS PUBLIC AUDITING” 978-1-5090-6221-8/17/$31.00 c 2017 IEEE

Nelmiawati Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia mia@polibatam.ac.id, Wahyudi Arifandi Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia wahyudi.arifandi@gmail.com,“A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service” 978-1-5386-8066-7/18/$31.00 ©2018 IEEE

S. Rathod, R. N. Khobragade, V. M. Thakare, K. H. Walse and S. Pawar, "Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization," 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 2022, pp. 1-6, doi: 10.1109/ICBDS53701.2022.9935980.

Rathod, S. G. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167-7173.

Rathod, S., & Gupta, A. K. (2014). An Authentication and Recovery method for color Images.

Salunke M. D, Kumbharkar P. B, & Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. https://doi.org/10.3233/apc210173.

M.D.Salunke, P.B., K., & SharmaYogesh Kumar. (2020). A Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723–2725. https://doi.org/10.35940/ijrte.a2860.059120.

López, M., Popovi?, N., Dimitrov, D., Botha, D., & Ben-David, Y. Efficient Dimensionality Reduction Techniques for High-Dimensional Data. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/145

Salunke, M., Kabra, R., & Kumar, A. (2015). IRJET-Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-mea Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-means Clustering Algorithm. International Research Journal of Engineering and Technology. www.irjet.net