Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality
Main Article Content
Abstract
The paper proposes a role-based secure data access control framework for cost-optimized cloud storage, addressing the challenge of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework incorporates a secure authenticity scheme to protect data during storage or transfer over the cloud. The framework leverages storage cost optimization by compressing high-resolution images and fragmenting them into multiple encrypted chunks using the owner's private key. The proposed approach offers two layers of security, ensuring that only authorized users can decrypt and reconstruct data into its original format. The implementation results depicts that the proposed scheme outperforms existing systems in various aspects, making it a reliable solution for cloud service providers to enhance data security while reducing storage costs.
Article Details
References
Katarzyna KAPUSTA, Han QIU, and Gerard MEMMI LTCI, Telecom ParisTech, Paris, France “Secure Data Sharing with Fast Access Revocation through Untrusted Clouds” 978-1-7281-1542-9/19/$31.00 ©2019 IEEE.
Li Li, Jiayong Liub “SecACS: Enabling lightweight secure auditable cloud storage with data dynamics” 2214-2126/© 2020 Elsevier Ltd. All rights reserved.
Reyhaneh Rabaninejad, Seyyed Mahdi Sedaghat, Mohamoud Ahmadian Attari, Mohammad Reza Aref “An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud” K. N. Toosi University of Technology Department of Electrical Engineering Tehran, Iran, 978-1-7281-5937-9/20/$31.00 ©2020 IEEE
Premlata Singh, Sushil Kr. Saroj “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage” Department of Computer Science & Engineering, Madan Mohan Malaviya University of Technology Gorakhpur, India 978-1-7281-5197-7/20/$31.00 ©2020 IEEE
Jian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang ?Colleage of Computer Science, Chongqing University, Chongqing, China “Improving Security Data Access Control for Multi-Authority Cloud Storage” 978-1-7281-4328-6/19/$31.00 ©2019 IEEE
Aritra Dutta, Rajesh Bose, Swamendu Kuma Chakraborty, Sandip Roy, Haraprasad Mondal, Computational science Brainware University, Kolkata India "Data Security Mechanism for Green Cloud", IEEE 2021
Ding ManJiang 1, Cao Kai 1, Wang ZengXi 2, Zhu LiPeng 3, 1. State Grid Jiangsu Tendering Co., Ltd, Nanjing, China 2. Jiangsu Electric Power Information Technology Co., Ltd, Nanjing, China 3. Global Energy Interconnection Research Institute Co., Ltd, Beijing, China, "Design of a Cloud Storage Security ncryption Algorithm for Power Bidding System", IEEE 2020
Subhash Rathod; Ratnashil N. Khobragade; Vilas M. Thakare; K.H. Walse; Sushama Pawar, Sant Gadge Baba Amravati University, Amravati, Pune, Maharashtra, India, “Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization”, IEEE 2022
Subhash G.Rathod, Dr.R.N.Khobragade , Dr.V.M.Thakare Sant Gadge Baba Amravati University, Amravati, Maharashtra, India. “Model for Compress & Secure Image Storing over Public Cloud”, Journal Of Electronics Information Technology Science And Management, 2022
YANG Zhen, WANG Wenyu, HUANG Yongfeng, and LI Xing, Department of Electronic Engineering, Tsinghua University, Beijing 100084, China “Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage” 2019 Chinese Institute of Electronics. DOI:10.1049/cje.2018.02.017 ©2019 IEEE
Subhash G. Rathod, R N khobragade, Vilas Thakare, Sushama L. Pawar, “Security for Shared Data Over Public Cloud for Maintaining Privacy”, Mathematical Statistician and Engineering Applications, 2022
Fei Chen, Fengming Meng, Tao Xiang, Hua Dai, Jianqiang Li, Jing Qin “Towards Usable Cloud Storage Auditing” 1045-9219 (c) 2020 IEEE
SI HAN, KE HAN, AND SHOUYI ZHANG Department of Science and Technology, China University of Political Science and Law, 102249 China “A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era” 2169-3536 2019 IEEE.
Leyou Zhang, Yilei Cui , and Yi Mu , Senior Member, IEEE “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing” 1937-9234 © 2019 IEEE
T. A. Mohanaprakash, Dr.J.Andrews Department of CSE, Sathyabama Institute of Science and Technology, Chennai 600119, Tamilnadu, India “Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm” 978-1-7281-1576-4/19/$31.00 ©2019 IEEE
YE TAO, PENG XU, and HAI JIN, National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab “Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage” 10.1109/ACCESS.2019.2962600, IEEE Access
Prof. Bhushan Thakre, Dr. R.M Thakre. (2017). Analysis of Modified Current Controller and its Implementation in Automotive LED. International Journal of New Practices in Management and Engineering, 6(04), 01 - 06. https://doi.org/10.17762/ijnpme.v6i04.60
Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Tengfei Yang, School of Cyber Engineering, Xidian University, Xi'an 710071, China “Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation” 978-1-5386-8088-9/19/$31.00 ©2019 IEEE
Wenxiu Ding, Member, IEEE, Rui Hu, Zheng Yan, Senior Member, IEEE, Xinren Qian, Robert H. Deng, Fellow, IEEE, Laurence T. Yang, Senior Member, IEEE, and Mianxiong Dong, Member, IEEE “An Extended Framework of Privacy-Preserving Computation with Flexible Access Control” 1932-4537 (c) 2019 IEEE
HAN YU, XIUQING LU, AND ZHENKUAN PAN, College of Computer Science and Technology, Qingdao University, Qingdao 266071, China, “An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing” r 10.1109/ACCESS. 2020 IEEE
Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis Department of Mathematics and Engineering Science, Hellenic Military Academy, Vari – 16673, Greece “Hash function design for cloud storage data auditing” 0304-3975/© 2019 Elsevier
Nureni Ayofe Azeez, Charles Van der Vyver School of Computer Science and Information Systems, Faculty of Natural and Agricultural Sciences, Vaal Triangle Campus, North-West University, South Africa. “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis” 1110-8665/2018 Production and hosting by Elsevier
Jianghong Wei , Wenfen Liu, and Xuexian Hu “Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage” IEEE SYSTEMS JOURNAL, VOL. 12, NO. 2, JUNE 2018
Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloud” 10.1109/MCC.2018. IEEE
Kaiping Xue, Senior Member, IEEE, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong “Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage” 1556-6013 (c) 2018 IEEE
Jianting Ning, Zhenfu Cao, Senior Member, IEEE, Xiaolei Dong, Kaitai Liang, Member, IEEE, Lifei Wei, and Kim-Kwang Raymond Choo, Senior Member, IEEE “CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage” 1939-1374 (c) 2017 IEEE
Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou Department of ECE Illinois Institute of Technology , Department of ECE Worcester Polytechnic Institute “Ensuring Data Storage Security in Cloud Computing” 978-1-4244-3876-1/09/$25.00 ©2009 IEEE
Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Ning Cao, and Wenjing Lou, Senior Member, IEEE, “Toward Secure and Dependable Storage Services in Cloud Computing” 1939-1374/12/$31.00 2012 IEEE
Syam Kumar P, Subramanian R Department of Computer Science, School of Engineering & Technology Pondicherry University, Puducherry-605014, India,“An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
CONG WANG1 (Member, IEEE), BINGSHENG ZHANG2 (Member, IEEE), KUI REN2 (Senior Member, IEEE), AND JANET M. ROVEDA3 (Senior Member, IEEE) Department of Computer Science, City University of Hong Kong, Hong Kong “Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud” IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:1 NO:1 YEAR 2013
Sahoo, D. K. . (2022). A Novel Method to Improve the Detection of Glaucoma Disease Using Machine Learning. Research Journal of Computer Systems and Engineering, 3(1), 67–72. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/44
Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013
Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 1045-9219/12/$31.00 © 2012 IEEE
Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2014
HUAQUN WANG1, 2 1 Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, “Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record” 2169-3536 (c) 2018 IEEE
R.Swathi, T.Subha, Associate Professor, Department of Information Technology, Sri Sairam Engineering College, Chennai, swathi.marthandan@gmail.com, subharajan@gmail.com, “ENHANCING DATA STORAGE SECURITY IN CLOUD USING CERTIFICATELESS PUBLIC AUDITING” 978-1-5090-6221-8/17/$31.00 c 2017 IEEE
Nelmiawati Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia mia@polibatam.ac.id, Wahyudi Arifandi Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia wahyudi.arifandi@gmail.com,“A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service” 978-1-5386-8066-7/18/$31.00 ©2018 IEEE
S. Rathod, R. N. Khobragade, V. M. Thakare, K. H. Walse and S. Pawar, "Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization," 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 2022, pp. 1-6, doi: 10.1109/ICBDS53701.2022.9935980.
Rathod, S. G. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167-7173.
Rathod, S., & Gupta, A. K. (2014). An Authentication and Recovery method for color Images.
Salunke M. D, Kumbharkar P. B, & Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. https://doi.org/10.3233/apc210173.
M.D.Salunke, P.B., K., & SharmaYogesh Kumar. (2020). A Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723–2725. https://doi.org/10.35940/ijrte.a2860.059120.
López, M., Popovi?, N., Dimitrov, D., Botha, D., & Ben-David, Y. Efficient Dimensionality Reduction Techniques for High-Dimensional Data. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/145
Salunke, M., Kabra, R., & Kumar, A. (2015). IRJET-Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-mea Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-means Clustering Algorithm. International Research Journal of Engineering and Technology. www.irjet.net