Abstract
Cloud computing has prominent branches of research with emerging technologies. The research related to security has increased with unusual disputes. Cloud service providers, as well as the users, have similar problems in concern with security issues. This paper has implemented to surmount protection-connected problems in deep related to data transfer problems in connection with efficiency in regard to time and cost. A hybrid access control mechanism (HACM) has been implemented, combining User-ID and User-Profile verification. Furthermore, the mechanism emphasizes the provision of safety measures in various circumstances. In this mechanism, SAML based token creation is employed to enhance safety measures. The architecture of this hybrid approach is offered to deal with User-ID and User-Profile managerial issues in the INTER/INTRA cloud framework. Indeed, it is verified with the implementation that this approach effectively improves safety measures in regard to time and cost.
Similar content being viewed by others
References
Amir MT (2015) Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J Inf Secur 6:118–130
Anand M, Ramya G (2013) A study on various bio inspired computing models. J Theoret Appl Inf Technol 57:418–423
Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30. https://doi.org/10.1145/1127345.1127346
Ausanka CR (2001) Methods for access control: advances and limitations. Harvey Mudd Coll 301:20
Balamurugan B and Krishna P V (2015) Enhanced role-based access control for cloud security. In: Artificial intelligence and evolutionary algorithms in engineering systems. Springer, New Delhi, pp 837–852. https://doi.org/10.1007/978-81-322-2126-5_89
Bethencourt J, Sahai A and Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334. IEEE. https://doi.org/10.1109/SP.2007.11
Cruz PL, Rivera D, Marsa MI, DeLa HE, Velasco JR (2018) Access control mechanism for IoT environments based on modelling communication procedures as resources. Sensors 18(3):917. https://doi.org/10.3390/s18030917
Ferraiolo D, Kuhn DR, Chandramouli R (2003) Role-based access control. Artech House
Fotiou N, Machas A, Polyzos GC, Xylomenos G (2015) Access control as a service for the Cloud. J Internet Serv Appl 6(1):11. https://doi.org/10.1186/s13174-015-0026-4
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200. https://doi.org/10.1587/transcom.E98.B.190
Gao XW, Jiang ZM, Jiang R (2013) A novel data access scheme in cloud computing. Adv Mater Res 756:2649–2654. https://doi.org/10.4028/www.scientific.net/AMR.756-759.2649
Govindaraj P, Jaisankar N (2017) A review on various trust models in cloud environment. J Eng Sci Technol Rev 10(2):213–219
Goyal V, Pandey O, Sahai A, and Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98. https://doi.org/10.1145/1180405.1180418
Green M, Hohenberger S and Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: Proceedings of USENIX security symposium, Vol. 2011, No. 3
Indu I, Anand PR, Bhaskar V (2018) Identity and access management in cloud environment: mechanisms and challenges. Eng Sci Technol Int J 21(4):574–588. https://doi.org/10.1016/j.jestch.2018.05.010
Jyoti J (2015) Extended JV-RBAC Model with secure API access control in cloud. Int J Emerg Res Manag Technol 4(6):69–72
Kaushik R, Ramya G (2016) Survey on mobile vulnerability issues and basic security policies. Int J Pharm Technol 8(2):3823–3833
Kritikou Y, Demestichas P, Adamopoulou E, Demestichas K, Theologou M, Paradia M (2008) User profile modeling in the context of web-based learning management systems. J Netw Comput Appl 31(4):603–627. https://doi.org/10.1016/j.jnca.2007.11.006
Kumaresan P, Subha S (2016) A low cost multi-functional robot prototype for intelligent services. Int J Pharm Technol 8(3):15370–15381
Kumaresan P, Prabukumar M, Yokesh BS (2016) An adaptable web based light weight framework for remote Hvac system using programmable thermostat. Int J Pharm Technol 8(3):16456–16466
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354. https://doi.org/10.1109/TIFS.2013.2271848
Lewko A, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Proceedings of Annual Cryptology Conference, Springer, Berlin, Heidelberg, pp 180–198. https://doi.org/10.1007/978-3-642-32009-5_12
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of Annual International Conference on the theory and applications of cryptographic techniques, Springer, Berlin, Heidelberg, pp 62–91. https://doi.org/10.1007/978-3-642-13190-5_4
Li J, Chen X, Li J, Jia C, Ma J, Lou W (2013a) Fine-grained access control system based on outsourced attribute-based encryption. In: Proceedings of European Symposium on research in computer security, Springer, Berlin, Heidelberg, pp 592–609. https://doi.org/10.1007/978-3-642-40203-6_33
Li J, Huang X, Li J, Chen X, Xiang Y (2013b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210. https://doi.org/10.1109/TPDS.2013.271
Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130. https://doi.org/10.1109/TIFS.2015.2449264
Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015a) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst 98(4):902–910. https://doi.org/10.1587/transinf.2014EDP7283
Ma H, Zhang R, Wan Z, Lu Y, Lin S (2015b) Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Depend Secure Comput 14(6):679–692. https://doi.org/10.1109/TDSC.2015.2499755
Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secure Comput 13(5):533–546. https://doi.org/10.1109/TDSC.2015.2423669
Namasudra S, Roy P, Balusamy B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In: Proceedings of International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–6. IEEE https://doi.org/10.1109/ICIIECS.2017.8275892
Ning J, Cao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Proceedings of European Symposium on research in computer security, Springer, Cham, pp 55–72. https://doi.org/10.1007/978-3-319-11212-1_4
Ning J, Dong X, Cao Z, Wei L (2015) Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Proceedings of European Symposium on research in computer security, pp 270–289, Springer, Cham. https://doi.org/10.1007/978-3-319-24177-7_14
Pazzani MJ (1999) A framework for collaborative, content-based and demographic filtering. Artif Intell Rev 13(5–6):393–408. https://doi.org/10.1023/A:1006544522159
Pearson S (2013) Privacy, security and trust in cloud computing. In:Privacy and security for cloud computing. Springer, London, pp 3–42. https://doi.org/10.1007/978-1-4471-4189-1_1
Priya G, Jaisankar N (2016) A reputation based trustworthy system in cloud environment. Int J Pharm Technol 2(3):16702–16708
Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393. https://doi.org/10.1109/TIFS.2015.2410137
Ramya G, Anand M (2016) Survey on various classes of picture languages. Int J Appl Eng Res 11(8):5376–5538
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of Annual International Conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp. 457-473. https://doi.org/10.1007/11426639_27
Sanjay T, Khushbu S (2014) Review on cloud computing security measure- role-based access control. Int J Adv Res Comput Sci Softw Eng 4(1)
Sugiyama K, Hatano K, Yoshikawa M (2004) Adaptive web search based on user profile constructed without any effort from users. In: Proceedings of the 13th International Conference on World Wide Web, pp 675–684. https://doi.org/10.1145/988672.988764
Sun L, Wang H (2010) A purpose based usage access control model. InT j Comput Inf Eng 4(1):44–51
Van MR, Van SM (2000) Using content-based filtering for recommendation. In: Proceedings of the Machine Learning in the new information age: MLnet/ECML2000 Workshop, Vol. 30, pp. 47-56
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, Springer, Berlin, Heidelberg, pp 53–70. https://doi.org/10.1007/978-3-642-19379-8_4
Wu Y, Suhendra V, Guo H (2012) A gateway-based access control scheme for collaborative clouds. In: Proceedings of 7th International Conference on Internet Monitoring and Protection, pp 54–60
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM, pp 1–9
Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18. https://doi.org/10.1007/s13174-010-0007-6
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mamidisetti, G., Makala, R. & Anilkumar, C. A novel access control mechanism for secure cloud communication using SAML based token creation. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02427-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-020-02427-8