Open Access Open Access  Restricted Access Subscription Access

Data Encryption using SCT and access control using TRBAC in Cloud Computing for Big Data


Affiliations
1 DSB Campus Kumaon University, Nainital, India
2 Deptt of Mathematics, DSB Campus, Kumaon University, India
3 Deptt of Science and Technology, Uttarakhand Science Education and Research Centre (USERC), India
 

Cloud Computing is the emerging trend to process different types of data and provide different services, and Big data is the huge source of such data. In this paper we proposed a framework in which we encrypt data with clock timing and then provide access according to task and role of the user. By this we can achieve a full secured and authorized access to cloud user with secure big data user.

Keywords

Big Data, Cloud Computing, RBAC, Task, SCT Encryption.
User
Notifications
Font Size

  • Eeva Savolainen, “Cloud Service Models”, UNIVERSITY OF HELSINKI.
  • Natarajan Meghanathan, Lynch St,Jackson “REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING”, Jackson State University,, USA.
  • Singh et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(6) June -2013,pp. 1136-1142 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006
  • Ganglidis Antonios, Mavridis Loannis,”Towards new access control model for cloud computing system” University of macedonio,Greece.
  • K-Y. Chen, C-Y. Lin and T-W. Hou, “The Low-Cost Secure Sessions of Access Control Model for Distributed Applications by Public Personal Smart Cards,” Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, pp. 894-899, December 2011.
  • Young-Gi Min1), Hyo-Jin Shin2), Young-Hwan” “Cloud Computing Security Issues and Access Control Solutions”
  • E. Bertino, P. A. Bonatti and E. Ferrari, “TRBAC: A Temporal Role-based Access Control Model,” ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 191-233, August 2001.
  • J. B. D. Joshi, E. Bertino, U. Latif and A. Ghafoor, “A Generalized Temporal Role-Based Access Control Model,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4-23, January 2005.
  • C. L. Dumitrescu and I. Foster, “GRUBER: A Grid Resource Usage SLA Broker,” Euro-Par 2005, LNCS 3648, pp. 465-474, 2005.
  • Liu Sainan, “Task-role-based access control model and its implementation” by College of Publish HangzhouDianziUniversity”
  • Dwivedi Akhilesh, K Kala, J Pant, RP Pant, Senam Pandey, Vertika Kandpal, “A Novice Encryption Technique using Substitution Clock and Time in It (SCT)” 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN) 2018, 23-24 Feb. 2018 Year: Pages: 1 - 6, DOI: 10.1109/ICACCAF.2016.7748991
  • J Pant, A Juyal, H Pant, A Dwivedi, “A Real-Time Application of Soft Set in Parameterization Reduction for Decision Making Problem”, International Journal of Electrical and Computer Engineering (IJECE), 2017/2/1, Volume 7, Issue 1, Pages 324-329
  • Krishna Kumar and Akhilesh Dwivedi, “Big Data Issues and Challenges in 21st Century", International Journal of Emerging Technologies (Special Issue NCETST-2017), Volume 8, Issue 1, Pages 72-77
  • Priyanka Suyal, Janmejay Pant, Akhilesh Dwivedi, Manoj Chandra Lohani, “Performance evaluation of rough set based classification models to intrusion detection system”, Advances in Computing, Communication, & Automation (ICACCA)(Fall), IEEE International Conference, 2016/9/30, 1-6
  • Senam Pandey, Akhilesh Dwivedi, Janmejay Pant, Manoj Lohani, “Security enforcement using TRBAC in cloud computing”, Computing, Communication and Automation (ICCCA), 2016 IEEE International Conference, 2016/4/29,1232-1238
  • Akhilesh Dwivedi, Abhishek Dwivedi, Suresh Kumar, Satish Kumar Pandey, Priyanka Dabra, “A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system” Advances in Computing and Information Technology,2013, Springer Berlin Heidelberg, Pages 367-379
  • Dwivedi Akhilesh, RP Pant, S Pandey, K Kumar, “Internet of Things’ (IoT’s) Impact on Decision Oriented Applications of Big Data Sentiment Analysis” 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU 2018), Pages: 1232 - 1238, DOI: 10.1109/CCAA.2016.7813905
  • Dwivedi Akhilesh, Kumar Suresh, Dwivedi Abhishek, Singh Manjeet, “Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web”, International Journal of Advanced Networking Applications (IJANA),Volume: 03, Issue: 01, JulyAug 2011, Pages: 978-983, ISSN: 0975-0282
  • Dwivedi Akhilesh, Bawankan Aparna, “Development of Semantic E-Learning Web using Protégé” CACCS 2013, World Conference on Advances in Communication and Control Systems in association with “DST” 7th April, 2013, organized by Dehradun Institute of Technology University Dehradun, Uttarakhand, India, Atlantis Press, pp 467-472
  • Dwivedi Akhilesh, Ojha Deo Bratt, Dwivedi Abhishek, “A Non-Repudiable Biased Bit String Commitment Scheme On A Post Quantum Cryptosystem Using Non-Abelian Group”, Journal of Global Research in Computer Science (JGRCS), Volume 1, Issue No. 4, Nov 2010, pp. 22-25, ISSN-2229-371X, http://www.jgrcs.info/index.php/jgrcs/article/view/33/35
  • Akhilesh Dwivedi, Krishna Kumar, “Big Data Issues and Challenges in 21st Century", International Journal on Emerging Technologies (Special Issue NCETST2017) https://www.researchtrend.net/ijet/pdf/18-F-771.pdf, Volume 8, Issue 1, Pages 72-77, International Journal on Emerging Technologies (Special Issue NCETST-2017) 8(1): 72-77(2017) (Published by Research Trend, Website: www.researchtrend.net)
  • Dwivedi Akhilesh, J Pant, A Juyal, H Pant, “A Real Time Application of Soft Set in Parameterization Reduction for Decision Making Problem”, International Journal of Electrical and Computer Engineering (IJECE) 7 (1),Volume: 07, Issue: 01, February 2017 : 324 – 329
  • Dwivedi Akhilesh, Kumar Suresh, Dwivedi Abhishek, Singh Manjeet, “Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web”, International Journal of Computer Applications (IJCA), Vol. no.21, issue no 8, May 2011, pp.1-8, ISSN:0975-8887, ISBN: 978-93-80749-29-8
  • J. W. Wang, Y. Tang, M. Nguyen, I. Altintas, "A Scalable Data Science Workflow Approach for Big Data Bayesian Network Learning", BDC ‘14 Proceedings of the 2014 IEEE/ACM International Symposium on Big Data Computing, pp. 16-25, 2014
  • Patil, S. S. (12-13May 2016). Overview of Big Data Visualization. International Journal of Advanced Networking & Applications (IJANA), Bengalura: RajaRajeswari College of Engineering, 436-438
  • Shekhar Himanshu, Manoj Sharma, "A Framework for Big Data Analytics as a Scalable Systems", Special Conference Issue: National Conference on Cloud Computing and Big Data IJANA, pp. 72-82.

Abstract Views: 219

PDF Views: 0




  • Data Encryption using SCT and access control using TRBAC in Cloud Computing for Big Data

Abstract Views: 219  |  PDF Views: 0

Authors

Akhilesh Dwivedi
DSB Campus Kumaon University, Nainital, India
R. P. Pant
Deptt of Mathematics, DSB Campus, Kumaon University, India
Durgesh Pant
Deptt of Science and Technology, Uttarakhand Science Education and Research Centre (USERC), India

Abstract


Cloud Computing is the emerging trend to process different types of data and provide different services, and Big data is the huge source of such data. In this paper we proposed a framework in which we encrypt data with clock timing and then provide access according to task and role of the user. By this we can achieve a full secured and authorized access to cloud user with secure big data user.

Keywords


Big Data, Cloud Computing, RBAC, Task, SCT Encryption.

References