Loading…
Secure data access in cloud computing
Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3 |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Sanka, S Hota, C Rajarajan, M |
description | Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models. |
doi_str_mv | 10.1109/IMSAA.2010.5729397 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5729397</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5729397</ieee_id><sourcerecordid>5729397</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</originalsourceid><addsrcrecordid>eNpVjztPwzAUhY0QEqjkD8DihTHF9nWufceo4lGpqEPLXDn2DQrqS3Ey8O-JRBfOcvQtn84R4kGrudaKnpcfm7qeGzVx5QwBuStRkPPaGmsdgYbrf6zwVhQ5f6splXHg6U48bTiOPcsUhiBDjJyz7I4y7k9jkvF0OI9Dd_y6Fzdt2GcuLj0Tn68v28V7uVq_LRf1qowaaCiTajx6y5qnecoTYtUg2OQMtkQVtk0issHYBIGptWgQLZjkkiXFKsFMPP55O2benfvuEPqf3eUc_AKCWUA3</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure data access in cloud computing</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Sanka, S ; Hota, C ; Rajarajan, M</creator><creatorcontrib>Sanka, S ; Hota, C ; Rajarajan, M</creatorcontrib><description>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</description><identifier>ISBN: 9781424479306</identifier><identifier>ISBN: 1424479304</identifier><identifier>EISBN: 9781424479313</identifier><identifier>EISBN: 1424479320</identifier><identifier>EISBN: 1424479312</identifier><identifier>EISBN: 9781424479320</identifier><identifier>DOI: 10.1109/IMSAA.2010.5729397</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Capability ; Cloud computing ; Cryptography ; Encryption ; Public key ; Security ; Servers</subject><ispartof>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 2010, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5729397$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5729397$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sanka, S</creatorcontrib><creatorcontrib>Hota, C</creatorcontrib><creatorcontrib>Rajarajan, M</creatorcontrib><title>Secure data access in cloud computing</title><title>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application</title><addtitle>IMSAA</addtitle><description>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</description><subject>Access control</subject><subject>Capability</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Public key</subject><subject>Security</subject><subject>Servers</subject><isbn>9781424479306</isbn><isbn>1424479304</isbn><isbn>9781424479313</isbn><isbn>1424479320</isbn><isbn>1424479312</isbn><isbn>9781424479320</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVjztPwzAUhY0QEqjkD8DihTHF9nWufceo4lGpqEPLXDn2DQrqS3Ey8O-JRBfOcvQtn84R4kGrudaKnpcfm7qeGzVx5QwBuStRkPPaGmsdgYbrf6zwVhQ5f6splXHg6U48bTiOPcsUhiBDjJyz7I4y7k9jkvF0OI9Dd_y6Fzdt2GcuLj0Tn68v28V7uVq_LRf1qowaaCiTajx6y5qnecoTYtUg2OQMtkQVtk0issHYBIGptWgQLZjkkiXFKsFMPP55O2benfvuEPqf3eUc_AKCWUA3</recordid><startdate>201012</startdate><enddate>201012</enddate><creator>Sanka, S</creator><creator>Hota, C</creator><creator>Rajarajan, M</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201012</creationdate><title>Secure data access in cloud computing</title><author>Sanka, S ; Hota, C ; Rajarajan, M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Access control</topic><topic>Capability</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Public key</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Sanka, S</creatorcontrib><creatorcontrib>Hota, C</creatorcontrib><creatorcontrib>Rajarajan, M</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sanka, S</au><au>Hota, C</au><au>Rajarajan, M</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure data access in cloud computing</atitle><btitle>2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application</btitle><stitle>IMSAA</stitle><date>2010-12</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>9781424479306</isbn><isbn>1424479304</isbn><eisbn>9781424479313</eisbn><eisbn>1424479320</eisbn><eisbn>1424479312</eisbn><eisbn>9781424479320</eisbn><abstract>Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data. This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider. The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models.</abstract><pub>IEEE</pub><doi>10.1109/IMSAA.2010.5729397</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424479306 |
ispartof | 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 2010, p.1-6 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5729397 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Capability Cloud computing Cryptography Encryption Public key Security Servers |
title | Secure data access in cloud computing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T22%3A30%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20data%20access%20in%20cloud%20computing&rft.btitle=2010%20IEEE%204th%20International%20Conference%20on%20Internet%20Multimedia%20Services%20Architecture%20and%20Application&rft.au=Sanka,%20S&rft.date=2010-12&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=9781424479306&rft.isbn_list=1424479304&rft_id=info:doi/10.1109/IMSAA.2010.5729397&rft.eisbn=9781424479313&rft.eisbn_list=1424479320&rft.eisbn_list=1424479312&rft.eisbn_list=9781424479320&rft_dat=%3Cieee_6IE%3E5729397%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c139t-d0b8684e1e109089665b634d726f9956fbd994a24d3ae9f46266432d7d490e0d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5729397&rfr_iscdi=true |