Skip to main content
Log in

A novel access control mechanism for secure cloud communication using SAML based token creation

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cloud computing has prominent branches of research with emerging technologies. The research related to security has increased with unusual disputes. Cloud service providers, as well as the users, have similar problems in concern with security issues. This paper has implemented to surmount protection-connected problems in deep related to data transfer problems in connection with efficiency in regard to time and cost. A hybrid access control mechanism (HACM) has been implemented, combining User-ID and User-Profile verification. Furthermore, the mechanism emphasizes the provision of safety measures in various circumstances. In this mechanism, SAML based token creation is employed to enhance safety measures. The architecture of this hybrid approach is offered to deal with User-ID and User-Profile managerial issues in the INTER/INTRA cloud framework. Indeed, it is verified with the implementation that this approach effectively improves safety measures in regard to time and cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Amir MT (2015) Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J Inf Secur 6:118–130

    Google Scholar 

  • Anand M, Ramya G (2013) A study on various bio inspired computing models. J Theoret Appl Inf Technol 57:418–423

    Google Scholar 

  • Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30. https://doi.org/10.1145/1127345.1127346

    Article  MATH  Google Scholar 

  • Ausanka CR (2001) Methods for access control: advances and limitations. Harvey Mudd Coll 301:20

    Google Scholar 

  • Balamurugan B and Krishna P V (2015) Enhanced role-based access control for cloud security. In: Artificial intelligence and evolutionary algorithms in engineering systems. Springer, New Delhi, pp 837–852. https://doi.org/10.1007/978-81-322-2126-5_89

  • Bethencourt J, Sahai A and Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334. IEEE. https://doi.org/10.1109/SP.2007.11

  • Cruz PL, Rivera D, Marsa MI, DeLa HE, Velasco JR (2018) Access control mechanism for IoT environments based on modelling communication procedures as resources. Sensors 18(3):917. https://doi.org/10.3390/s18030917

    Article  Google Scholar 

  • Ferraiolo D, Kuhn DR, Chandramouli R (2003) Role-based access control. Artech House

  • Fotiou N, Machas A, Polyzos GC, Xylomenos G (2015) Access control as a service for the Cloud. J Internet Serv Appl 6(1):11. https://doi.org/10.1186/s13174-015-0026-4

    Article  Google Scholar 

  • Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200. https://doi.org/10.1587/transcom.E98.B.190

    Article  Google Scholar 

  • Gao XW, Jiang ZM, Jiang R (2013) A novel data access scheme in cloud computing. Adv Mater Res 756:2649–2654. https://doi.org/10.4028/www.scientific.net/AMR.756-759.2649

    Article  Google Scholar 

  • Govindaraj P, Jaisankar N (2017) A review on various trust models in cloud environment. J Eng Sci Technol Rev 10(2):213–219

    Article  Google Scholar 

  • Goyal V, Pandey O, Sahai A, and Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98. https://doi.org/10.1145/1180405.1180418

  • Green M, Hohenberger S and Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: Proceedings of USENIX security symposium, Vol. 2011, No. 3

  • Indu I, Anand PR, Bhaskar V (2018) Identity and access management in cloud environment: mechanisms and challenges. Eng Sci Technol Int J 21(4):574–588. https://doi.org/10.1016/j.jestch.2018.05.010

    Article  Google Scholar 

  • Jyoti J (2015) Extended JV-RBAC Model with secure API access control in cloud. Int J Emerg Res Manag Technol 4(6):69–72

    Google Scholar 

  • Kaushik R, Ramya G (2016) Survey on mobile vulnerability issues and basic security policies. Int J Pharm Technol 8(2):3823–3833

    Google Scholar 

  • Kritikou Y, Demestichas P, Adamopoulou E, Demestichas K, Theologou M, Paradia M (2008) User profile modeling in the context of web-based learning management systems. J Netw Comput Appl 31(4):603–627. https://doi.org/10.1016/j.jnca.2007.11.006

    Article  Google Scholar 

  • Kumaresan P, Subha S (2016) A low cost multi-functional robot prototype for intelligent services. Int J Pharm Technol 8(3):15370–15381

    Google Scholar 

  • Kumaresan P, Prabukumar M, Yokesh BS (2016) An adaptable web based light weight framework for remote Hvac system using programmable thermostat. Int J Pharm Technol 8(3):16456–16466

    Google Scholar 

  • Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354. https://doi.org/10.1109/TIFS.2013.2271848

    Article  Google Scholar 

  • Lewko A, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Proceedings of Annual Cryptology Conference, Springer, Berlin, Heidelberg, pp 180–198. https://doi.org/10.1007/978-3-642-32009-5_12

  • Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of Annual International Conference on the theory and applications of cryptographic techniques, Springer, Berlin, Heidelberg, pp 62–91. https://doi.org/10.1007/978-3-642-13190-5_4

  • Li J, Chen X, Li J, Jia C, Ma J, Lou W (2013a) Fine-grained access control system based on outsourced attribute-based encryption. In: Proceedings of European Symposium on research in computer security, Springer, Berlin, Heidelberg, pp 592–609. https://doi.org/10.1007/978-3-642-40203-6_33

  • Li J, Huang X, Li J, Chen X, Xiang Y (2013b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210. https://doi.org/10.1109/TPDS.2013.271

    Article  Google Scholar 

  • Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130. https://doi.org/10.1109/TIFS.2015.2449264

    Article  Google Scholar 

  • Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015a) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst 98(4):902–910. https://doi.org/10.1587/transinf.2014EDP7283

    Article  Google Scholar 

  • Ma H, Zhang R, Wan Z, Lu Y, Lin S (2015b) Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Depend Secure Comput 14(6):679–692. https://doi.org/10.1109/TDSC.2015.2499755

    Article  Google Scholar 

  • Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secure Comput 13(5):533–546. https://doi.org/10.1109/TDSC.2015.2423669

    Article  Google Scholar 

  • Namasudra S, Roy P, Balusamy B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In: Proceedings of International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–6. IEEE https://doi.org/10.1109/ICIIECS.2017.8275892

  • Ning J, Cao Z, Dong X, Wei L, Lin X (2014) Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Proceedings of European Symposium on research in computer security, Springer, Cham, pp 55–72. https://doi.org/10.1007/978-3-319-11212-1_4

  • Ning J, Dong X, Cao Z, Wei L (2015) Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Proceedings of European Symposium on research in computer security, pp 270–289, Springer, Cham. https://doi.org/10.1007/978-3-319-24177-7_14

  • Pazzani MJ (1999) A framework for collaborative, content-based and demographic filtering. Artif Intell Rev 13(5–6):393–408. https://doi.org/10.1023/A:1006544522159

    Article  Google Scholar 

  • Pearson S (2013) Privacy, security and trust in cloud computing. In:Privacy and security for cloud computing. Springer, London, pp 3–42. https://doi.org/10.1007/978-1-4471-4189-1_1

  • Priya G, Jaisankar N (2016) A reputation based trustworthy system in cloud environment. Int J Pharm Technol 2(3):16702–16708

    Google Scholar 

  • Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393. https://doi.org/10.1109/TIFS.2015.2410137

    Article  Google Scholar 

  • Ramya G, Anand M (2016) Survey on various classes of picture languages. Int J Appl Eng Res 11(8):5376–5538

    Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of Annual International Conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp. 457-473. https://doi.org/10.1007/11426639_27

  • Sanjay T, Khushbu S (2014) Review on cloud computing security measure- role-based access control. Int J Adv Res Comput Sci Softw Eng 4(1)

  • Sugiyama K, Hatano K, Yoshikawa M (2004) Adaptive web search based on user profile constructed without any effort from users. In: Proceedings of the 13th International Conference on World Wide Web, pp 675–684. https://doi.org/10.1145/988672.988764

  • Sun L, Wang H (2010) A purpose based usage access control model. InT j Comput Inf Eng 4(1):44–51

    Google Scholar 

  • Van MR, Van SM (2000) Using content-based filtering for recommendation. In: Proceedings of the Machine Learning in the new information age: MLnet/ECML2000 Workshop, Vol. 30, pp. 47-56

  • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, Springer, Berlin, Heidelberg, pp 53–70. https://doi.org/10.1007/978-3-642-19379-8_4

  • Wu Y, Suhendra V, Guo H (2012) A gateway-based access control scheme for collaborative clouds. In: Proceedings of 7th International Conference on Internet Monitoring and Protection, pp 54–60

  • Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM, pp 1–9

  • Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18. https://doi.org/10.1007/s13174-010-0007-6

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gowtham Mamidisetti.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mamidisetti, G., Makala, R. & Anilkumar, C. A novel access control mechanism for secure cloud communication using SAML based token creation. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02427-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-020-02427-8

Keywords

Navigation