Abstract
Cloud computing is the distributed collection of virtual computing devices which are used to store, process and outsource the data for the different vendors in dynamic manner. Data which is being the most valuable asset in cloud computing is vulnerable to security and privacy of data that is being shared and used in the cloud environment. Guaranteeing security and privacy for information management and query handling in the cloud is very much needed to provide privacy to user’s data which is stored in the cloud environment. Additionally, the main aim should be at protection from cyber-attacks and also preserve the information access and the authority sharing in multiuser collective cloud environments. To overcome these issues, a privacy preserving with enhanced access model has been proposed by using the Advanced Encryption Standard (AES) algorithm along with distributed key management technique which aims at securing data which is stored within a cloud environment. Moreover, a trusted third-party along with the data owners and data users is employed in the proposed system to make sure that authentication and authorization are carried out with independently without cloud server. By doing so, the proposed system can provide an efficient authentication with trusted third party and can provide privacy-enhanced access control to the data or information stored in the cloud environment. The proposed system is implemented using CloudSim with realistic simulation parameters. The simulation results justifies that the proposed system has better DoS attack detection and has better overhead in terms of computation, communication and storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SS (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. In: Wireless networks. Springer, Berlin, pp 1–22
Selvi M, Thangaramya K, Sannasi G, Kulothungan K, Khannah Nehemiah H, Kannan A (2019) An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. In: Wireless personal communications. Springer, Berlin, pp 1–16
Alanazi H, Bahaa ZB, Alaa ZA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157
Bhat B, Ali AW, Gupta A (2015) DES and AES performance evaluation. In: IEEE, International conference on computing, communication & automation, pp 887–890
Hasib A, Haque AAMM (2008) A comparative study of the performance and security ıssues of AES and RSA cryptography. In: IEEE, Third ınternational conference on convergence and hybrid ınformation technology, vol 2, pp 505–510
Ramya DR, Vijaya CV (2020) Triple DES: privacy preserving in big data healthcare. Int J Parallel Prog 48(3):515–533
Thanamani AS (2018) An efficient privacy preservation frame work for big data using IRSA. Int J Appl Eng Res 13(11):8936–8940
Aman MN, Basheer MH, Sikdar B (2018) Two-factor authentication for IoT with location information. IEEE Internet Things J 6(2):3335–3351
Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204
Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real- time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092
Cai Z, He Z, Guan X, Li Y (2016) Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Dependable Secure Comput 15(4):577–590
Sun Y, Lu R, Lin X, Shen X, Su J (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589–3603
Aijaz A, Hamid AA (2015) Cognitive machine-to-machine communications for Internet-of-Things: a protocol stack perspective. IEEE Internet Things J 2(2):103–112
Zhang W, Subramanian N, Wang G (2008) Lightweight and compromise-resilient message authentication in sensor networks. In: IEEE INFOCOM 2008—The 27th conference on computer communications, pp 1418–1426
Li J, Liu Y, Zhang Z, Li B, Liu H, Cheng J (2018) Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. In: IEEE International conference on computing, networking and communications, pp 322–326
Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, Ditta A (2020) Secure framework enhancing AES algorithm in cloud computing. Secur Commun Netw 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rishiroop, B.B., Puneeth, P., Bhanuteja, T., Selvi, M., Santhoshkumar, S.V.N., Kannan, A. (2022). Privacy-Enhanced Access Control for Providing Efficient Security in Cloud Environment. In: Pandian, A.P., Palanisamy, R., Narayanan, M., Senjyu, T. (eds) Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems. Advances in Intelligent Systems and Computing, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-7330-6_60
Download citation
DOI: https://doi.org/10.1007/978-981-16-7330-6_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7329-0
Online ISBN: 978-981-16-7330-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)