Advertisement

TBSAC: Token-Based Secured Access Control for Cloud Data

  • Pankaj Upadhyay
  • Rupa G. MehtaEmail author
Conference paper
  • 15 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1097)

Abstract

Growing digital world has led to enormous data. With the growing data, its availability and processing have become a tedious task which is rescued by cloud computing. The cloud computing and data integration pose critical security concern to protect the data from unauthorized access. The current literature suggests various data access control schemes and models for cloud, but all provide permanent access to the resources, i.e., once a user is authenticated, either he is required or is not to be authenticated or authorized for subsequent requests. The data industry nowadays works on auto-expiry access tokens with traditional access control mechanisms which the current literature lacks. This paper contains a framework for data privacy using contextual information, attribute-based encryption, time-based assured data deletion, JSON Web Token (JWT) for token-based authorization, challenge response-based authentication, policy and context update with hidden policy for attribute-based encryption.

Keywords

Access control Token-based authorization Cloud data Attribute-based encryption 

References

  1. 1.
    Singh, Jatinder, et al. 2015. Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of things Journal 3 (3): 269–284.  https://doi.org/10.1109/JIOT.2015.2460333
  2. 2.
    Tang, Yang, et al. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing 9 (6): 903–916.  https://doi.org/10.1109/TDSC.2012.49
  3. 3.
    Nusrat, Raisa, and Rajesh Palit. 2017. Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system 2017. In IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE.  https://doi.org/10.1109/CCWC.2017.7868486.
  4. 4.
    Ali, Mazhar, Saif UR Malik, and Samee U. Khan. 2015. DaSCE: Data security for cloud environment with semi-trusted third party. IEEE Transactions on Cloud Computing 5 (4): 642–655.  https://doi.org/10.1109/TCC.2015.2446458
  5. 5.
    Cui, Zongmin, et al. 2015. Efficient key management for IOT owner in the cloud. In 2015 IEEE fifth international conference on big data and cloud computing. IEEE.  https://doi.org/10.1109/BDCloud.2015.40
  6. 6.
    Zhang, Yuanyuan, et al. 2016. A multi-replica associated deleting scheme in cloud. 2016 10th international conference on complex, intelligent, and software intensive systems (CISIS). IEEE 2016.  https://doi.org/10.1109/CISIS.2016.68
  7. 7.
    Arfaoui, Amel, et al. 2019. Context-aware access control and anonymous authentication in WBAN. Computers and Security.  https://doi.org/10.1016/j.cose.2019.03.017.
  8. 8.
    Dong, Yuji, et al. 2018. Contexts-states-aware access control for internet of things. In 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE.  https://doi.org/10.1109/CSCWD.2018.8465364.
  9. 9.
    Malamateniou, Flora, et al. 2016. A context-aware, capability-based, role-centric access control model for IoMT.In International conference on wireless mobile communication and healthcare. Cham: Springer.  https://doi.org/10.1007/978-3-319-58877-3_16.
  10. 10.
    Zhang, Zhiyong, et al. 2018. Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6: 38273–38284.  https://doi.org/10.1109/ACCESS.2018.2854600.
  11. 11.
    Esposito, Christian. 2018. Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network & Computer Applications 108: 124–136.  https://doi.org/10.1016/j.jnca.2018.01.017.CrossRefGoogle Scholar
  12. 12.
    Wang, Shangping, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6: 38437–38450.  https://doi.org/10.1109/ACCESS.2018.2851611.CrossRefGoogle Scholar
  13. 13.
    Kapadia, Apu, Patrick P. Tsang, and Sean W. Smith. 2007. Attribute-based publishing with hidden credentials and hidden policies. NDSS 7.Google Scholar
  14. 14.
    Bethencourt, John, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. 2007. In IEEE symposium on security and privacy (SP’07). IEEE.  https://doi.org/10.1109/SP.2007.11.
  15. 15.
    Perera, Charith, et al. 2013. Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials 16 (1): 414–454.  https://doi.org/10.1109/SURV.2013.042313.00197.
  16. 16.
    Bradley, John, Nat Sakimura, and Michael B. Jones. 2015. JSON web token (JWT).Google Scholar
  17. 17.
    Gentry, Craig, and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. No. 09. Stanford: Stanford University.Google Scholar
  18. 18.
    Holt, Jason E., et al. 2003. Hidden credentials. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society. ACM.  https://doi.org/10.1145/1005140.1005142.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Sardar Vallabhbhai National Institute of TechnologySuratIndia

Personalised recommendations