TBSAC: Token-Based Secured Access Control for Cloud Data
- 15 Downloads
Growing digital world has led to enormous data. With the growing data, its availability and processing have become a tedious task which is rescued by cloud computing. The cloud computing and data integration pose critical security concern to protect the data from unauthorized access. The current literature suggests various data access control schemes and models for cloud, but all provide permanent access to the resources, i.e., once a user is authenticated, either he is required or is not to be authenticated or authorized for subsequent requests. The data industry nowadays works on auto-expiry access tokens with traditional access control mechanisms which the current literature lacks. This paper contains a framework for data privacy using contextual information, attribute-based encryption, time-based assured data deletion, JSON Web Token (JWT) for token-based authorization, challenge response-based authentication, policy and context update with hidden policy for attribute-based encryption.
KeywordsAccess control Token-based authorization Cloud data Attribute-based encryption
- 1.Singh, Jatinder, et al. 2015. Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of things Journal 3 (3): 269–284. https://doi.org/10.1109/JIOT.2015.2460333
- 2.Tang, Yang, et al. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing 9 (6): 903–916. https://doi.org/10.1109/TDSC.2012.49
- 3.Nusrat, Raisa, and Rajesh Palit. 2017. Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system 2017. In IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE. https://doi.org/10.1109/CCWC.2017.7868486.
- 4.Ali, Mazhar, Saif UR Malik, and Samee U. Khan. 2015. DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing 5 (4): 642–655. https://doi.org/10.1109/TCC.2015.2446458
- 5.Cui, Zongmin, et al. 2015. Efficient key management for IOT owner in the cloud. In 2015 IEEE fifth international conference on big data and cloud computing. IEEE. https://doi.org/10.1109/BDCloud.2015.40
- 6.Zhang, Yuanyuan, et al. 2016. A multi-replica associated deleting scheme in cloud. 2016 10th international conference on complex, intelligent, and software intensive systems (CISIS). IEEE 2016. https://doi.org/10.1109/CISIS.2016.68
- 7.Arfaoui, Amel, et al. 2019. Context-aware access control and anonymous authentication in WBAN. Computers and Security. https://doi.org/10.1016/j.cose.2019.03.017.
- 8.Dong, Yuji, et al. 2018. Contexts-states-aware access control for internet of things. In 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE. https://doi.org/10.1109/CSCWD.2018.8465364.
- 9.Malamateniou, Flora, et al. 2016. A context-aware, capability-based, role-centric access control model for IoMT.In International conference on wireless mobile communication and healthcare. Cham: Springer. https://doi.org/10.1007/978-3-319-58877-3_16.
- 10.Zhang, Zhiyong, et al. 2018. Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6: 38273–38284. https://doi.org/10.1109/ACCESS.2018.2854600.
- 13.Kapadia, Apu, Patrick P. Tsang, and Sean W. Smith. 2007. Attribute-based publishing with hidden credentials and hidden policies. NDSS 7.Google Scholar
- 14.Bethencourt, John, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. 2007. In IEEE symposium on security and privacy (SP’07). IEEE. https://doi.org/10.1109/SP.2007.11.
- 15.Perera, Charith, et al. 2013. Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials 16 (1): 414–454. https://doi.org/10.1109/SURV.2013.042313.00197.
- 16.Bradley, John, Nat Sakimura, and Michael B. Jones. 2015. JSON web token (JWT).Google Scholar
- 17.Gentry, Craig, and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. No. 09. Stanford: Stanford University.Google Scholar
- 18.Holt, Jason E., et al. 2003. Hidden credentials. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society. ACM. https://doi.org/10.1145/1005140.1005142.