Abstract
Growing digital world has led to enormous data. With the growing data, its availability and processing have become a tedious task which is rescued by cloud computing. The cloud computing and data integration pose critical security concern to protect the data from unauthorized access. The current literature suggests various data access control schemes and models for cloud, but all provide permanent access to the resources, i.e., once a user is authenticated, either he is required or is not to be authenticated or authorized for subsequent requests. The data industry nowadays works on auto-expiry access tokens with traditional access control mechanisms which the current literature lacks. This paper contains a framework for data privacy using contextual information, attribute-based encryption, time-based assured data deletion, JSON Web Token (JWT) for token-based authorization, challenge response-based authentication, policy and context update with hidden policy for attribute-based encryption.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Singh, Jatinder, et al. 2015. Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of things Journal 3 (3): 269–284. https://doi.org/10.1109/JIOT.2015.2460333
Tang, Yang, et al. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing 9 (6): 903–916. https://doi.org/10.1109/TDSC.2012.49
Nusrat, Raisa, and Rajesh Palit. 2017. Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system 2017. In IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE. https://doi.org/10.1109/CCWC.2017.7868486.
Ali, Mazhar, Saif UR Malik, and Samee U. Khan. 2015. DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing 5 (4): 642–655. https://doi.org/10.1109/TCC.2015.2446458
Cui, Zongmin, et al. 2015. Efficient key management for IOT owner in the cloud. In 2015 IEEE fifth international conference on big data and cloud computing. IEEE. https://doi.org/10.1109/BDCloud.2015.40
Zhang, Yuanyuan, et al. 2016. A multi-replica associated deleting scheme in cloud. 2016 10th international conference on complex, intelligent, and software intensive systems (CISIS). IEEE 2016. https://doi.org/10.1109/CISIS.2016.68
Arfaoui, Amel, et al. 2019. Context-aware access control and anonymous authentication in WBAN. Computers and Security. https://doi.org/10.1016/j.cose.2019.03.017.
Dong, Yuji, et al. 2018. Contexts-states-aware access control for internet of things. In 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE. https://doi.org/10.1109/CSCWD.2018.8465364.
Malamateniou, Flora, et al. 2016. A context-aware, capability-based, role-centric access control model for IoMT.In International conference on wireless mobile communication and healthcare. Cham: Springer. https://doi.org/10.1007/978-3-319-58877-3_16.
Zhang, Zhiyong, et al. 2018. Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6: 38273–38284. https://doi.org/10.1109/ACCESS.2018.2854600.
Esposito, Christian. 2018. Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network & Computer Applications 108: 124–136. https://doi.org/10.1016/j.jnca.2018.01.017.
Wang, Shangping, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6: 38437–38450. https://doi.org/10.1109/ACCESS.2018.2851611.
Kapadia, Apu, Patrick P. Tsang, and Sean W. Smith. 2007. Attribute-based publishing with hidden credentials and hidden policies. NDSS 7.
Bethencourt, John, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. 2007. In IEEE symposium on security and privacy (SP’07). IEEE. https://doi.org/10.1109/SP.2007.11.
Perera, Charith, et al. 2013. Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials 16 (1): 414–454. https://doi.org/10.1109/SURV.2013.042313.00197.
Bradley, John, Nat Sakimura, and Michael B. Jones. 2015. JSON web token (JWT).
Gentry, Craig, and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. No. 09. Stanford: Stanford University.
Holt, Jason E., et al. 2003. Hidden credentials. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society. ACM. https://doi.org/10.1145/1005140.1005142.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
See Appendix Fig. 7
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Upadhyay, P., Mehta, R.G. (2020). TBSAC: Token-Based Secured Access Control for Cloud Data. In: Hu, YC., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-15-1518-7_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-1518-7_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1517-0
Online ISBN: 978-981-15-1518-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)