Loading…

Secure data access in cloud computing

Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from...

Full description

Saved in:
Bibliographic Details
Main Authors: Sanka, S, Hota, C, Rajarajan, M
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Sanka, S
Hota, C
Rajarajan, M
description Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.
doi_str_mv 10.1109/IMSAA.2010.5729397
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5729397</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5729397</ieee_id><sourcerecordid>5729397</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</originalsourceid><addsrcrecordid>eNpVjztPwzAUhY0QEqjkD8DihTHF9nWufceo4lGpqEPLXDn2DQrqS3Ey8O-JRBfOcvQtn84R4kGrudaKnpcfm7qeGzVx5QwBuStRkPPaGmsdgYbrf6zwVhQ5f6splXHg6U48bTiOPcsUhiBDjJyz7I4y7k9jkvF0OI9Dd_y6Fzdt2GcuLj0Tn68v28V7uVq_LRf1qowaaCiTajx6y5qnecoTYtUg2OQMtkQVtk0issHYBIGptWgQLZjkkiXFKsFMPP55O2benfvuEPqf3eUc_AKCWUA3</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure data access in cloud computing</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Sanka, S ; Hota, C ; Rajarajan, M</creator><creatorcontrib>Sanka, S ; Hota, C ; Rajarajan, M</creatorcontrib><description>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</description><identifier>ISBN: 9781424479306</identifier><identifier>ISBN: 1424479304</identifier><identifier>EISBN: 9781424479313</identifier><identifier>EISBN: 1424479320</identifier><identifier>EISBN: 1424479312</identifier><identifier>EISBN: 9781424479320</identifier><identifier>DOI: 10.1109/IMSAA.2010.5729397</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Capability ; Cloud computing ; Cryptography ; Encryption ; Public key ; Security ; Servers</subject><ispartof>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 2010, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5729397$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5729397$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sanka, S</creatorcontrib><creatorcontrib>Hota, C</creatorcontrib><creatorcontrib>Rajarajan, M</creatorcontrib><title>Secure data access in cloud computing</title><title>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application</title><addtitle>IMSAA</addtitle><description>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</description><subject>Access control</subject><subject>Capability</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Public key</subject><subject>Security</subject><subject>Servers</subject><isbn>9781424479306</isbn><isbn>1424479304</isbn><isbn>9781424479313</isbn><isbn>1424479320</isbn><isbn>1424479312</isbn><isbn>9781424479320</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVjztPwzAUhY0QEqjkD8DihTHF9nWufceo4lGpqEPLXDn2DQrqS3Ey8O-JRBfOcvQtn84R4kGrudaKnpcfm7qeGzVx5QwBuStRkPPaGmsdgYbrf6zwVhQ5f6splXHg6U48bTiOPcsUhiBDjJyz7I4y7k9jkvF0OI9Dd_y6Fzdt2GcuLj0Tn68v28V7uVq_LRf1qowaaCiTajx6y5qnecoTYtUg2OQMtkQVtk0issHYBIGptWgQLZjkkiXFKsFMPP55O2benfvuEPqf3eUc_AKCWUA3</recordid><startdate>201012</startdate><enddate>201012</enddate><creator>Sanka, S</creator><creator>Hota, C</creator><creator>Rajarajan, M</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201012</creationdate><title>Secure data access in cloud computing</title><author>Sanka, S ; Hota, C ; Rajarajan, M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access control</topic><topic>Capability</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Public key</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Sanka, S</creatorcontrib><creatorcontrib>Hota, C</creatorcontrib><creatorcontrib>Rajarajan, M</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sanka, S</au><au>Hota, C</au><au>Rajarajan, M</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure data access in cloud computing</atitle><btitle>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application</btitle><stitle>IMSAA</stitle><date>2010-12</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>9781424479306</isbn><isbn>1424479304</isbn><eisbn>9781424479313</eisbn><eisbn>1424479320</eisbn><eisbn>1424479312</eisbn><eisbn>9781424479320</eisbn><abstract>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</abstract><pub>IEEE</pub><doi>10.1109/IMSAA.2010.5729397</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424479306
ispartof 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 2010, p.1-6
issn
language eng
recordid cdi_ieee_primary_5729397
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Capability
Cloud computing
Cryptography
Encryption
Public key
Security
Servers
title Secure data access in cloud computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T22%3A30%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20data%20access%20in%20cloud%20computing&rft.btitle=2010%20IEEE%204th%20International%20Conference%20on%20Internet%20Multimedia%20Services%20Architecture%20and%20Application&rft.au=Sanka,%20S&rft.date=2010-12&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=9781424479306&rft.isbn_list=1424479304&rft_id=info:doi/10.1109/IMSAA.2010.5729397&rft.eisbn=9781424479313&rft.eisbn_list=1424479320&rft.eisbn_list=1424479312&rft.eisbn_list=9781424479320&rft_dat=%3Cieee_6IE%3E5729397%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5729397&rfr_iscdi=true