Skip to main content

TBSAC: Token-Based Secured Access Control for Cloud Data

  • Conference paper
  • First Online:
  • 540 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1097))

Abstract

Growing digital world has led to enormous data. With the growing data, its availability and processing have become a tedious task which is rescued by cloud computing. The cloud computing and data integration pose critical security concern to protect the data from unauthorized access. The current literature suggests various data access control schemes and models for cloud, but all provide permanent access to the resources, i.e., once a user is authenticated, either he is required or is not to be authenticated or authorized for subsequent requests. The data industry nowadays works on auto-expiry access tokens with traditional access control mechanisms which the current literature lacks. This paper contains a framework for data privacy using contextual information, attribute-based encryption, time-based assured data deletion, JSON Web Token (JWT) for token-based authorization, challenge response-based authentication, policy and context update with hidden policy for attribute-based encryption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Singh, Jatinder, et al. 2015. Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of things Journal 3 (3): 269–284. https://doi.org/10.1109/JIOT.2015.2460333

  2. Tang, Yang, et al. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing 9 (6): 903–916. https://doi.org/10.1109/TDSC.2012.49

  3. Nusrat, Raisa, and Rajesh Palit. 2017. Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system 2017. In IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE. https://doi.org/10.1109/CCWC.2017.7868486.

  4. Ali, Mazhar, Saif UR Malik, and Samee U. Khan. 2015. DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing 5 (4): 642–655. https://doi.org/10.1109/TCC.2015.2446458

  5. Cui, Zongmin, et al. 2015. Efficient key management for IOT owner in the cloud. In 2015 IEEE fifth international conference on big data and cloud computing. IEEE. https://doi.org/10.1109/BDCloud.2015.40

  6. Zhang, Yuanyuan, et al. 2016. A multi-replica associated deleting scheme in cloud. 2016 10th international conference on complex, intelligent, and software intensive systems (CISIS). IEEE 2016. https://doi.org/10.1109/CISIS.2016.68

  7. Arfaoui, Amel, et al. 2019. Context-aware access control and anonymous authentication in WBAN. Computers and Security. https://doi.org/10.1016/j.cose.2019.03.017.

  8. Dong, Yuji, et al. 2018. Contexts-states-aware access control for internet of things. In 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE. https://doi.org/10.1109/CSCWD.2018.8465364.

  9. Malamateniou, Flora, et al. 2016. A context-aware, capability-based, role-centric access control model for IoMT.In International conference on wireless mobile communication and healthcare. Cham: Springer. https://doi.org/10.1007/978-3-319-58877-3_16.

  10. Zhang, Zhiyong, et al. 2018. Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6: 38273–38284. https://doi.org/10.1109/ACCESS.2018.2854600.

  11. Esposito, Christian. 2018. Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network & Computer Applications 108: 124–136. https://doi.org/10.1016/j.jnca.2018.01.017.

    Article  Google Scholar 

  12. Wang, Shangping, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6: 38437–38450. https://doi.org/10.1109/ACCESS.2018.2851611.

    Article  Google Scholar 

  13. Kapadia, Apu, Patrick P. Tsang, and Sean W. Smith. 2007. Attribute-based publishing with hidden credentials and hidden policies. NDSS 7.

    Google Scholar 

  14. Bethencourt, John, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. 2007. In IEEE symposium on security and privacy (SP’07). IEEE. https://doi.org/10.1109/SP.2007.11.

  15. Perera, Charith, et al. 2013. Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials 16 (1): 414–454. https://doi.org/10.1109/SURV.2013.042313.00197.

  16. Bradley, John, Nat Sakimura, and Michael B. Jones. 2015. JSON web token (JWT).

    Google Scholar 

  17. Gentry, Craig, and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. No. 09. Stanford: Stanford University.

    Google Scholar 

  18. Holt, Jason E., et al. 2003. Hidden credentials. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society. ACM. https://doi.org/10.1145/1005140.1005142.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rupa G. Mehta .

Editor information

Editors and Affiliations

Appendix

Appendix

See Appendix Fig. 7

Fig. 7
figure 7

Literature review

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Upadhyay, P., Mehta, R.G. (2020). TBSAC: Token-Based Secured Access Control for Cloud Data. In: Hu, YC., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-15-1518-7_20

Download citation

Publish with us

Policies and ethics