Abstract
Cloud according to the latest buzz is the third wave of digitization. Cloud brought all things back at the center. Cloud redefines the way of computing—“where you computing is not important than how you compute”. Sharing of public resources like platform, software and infrastructure easily depending upon requirements. The connectivity of cloud eroded the division of resource sharing. The ability to access data from the cloud—anywhere, anytime—increases the security risk. Security is an essential ingredient to reduce security risk. Trust on technology is good, but as data owner is not with data all the time, so control is better. Cryptographic scheme, identity-based proxy re-encryption, is used to transform data before transferring into public environment. Data owner is not with data, so rule-based data-centric solution is proposed to keep data secure. For preventing unauthorized access of data, role-based authorization access control is developed. The solution is developed using OpenStack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bernabe, J.B., Alcaraz Calero, J.M., Clemente, F.J.G., Perez, G.M.: Taxonomy of trust relationships in authorization domains for cloud computing (2014)
Marin Perez, J.M., Perez, G.M., Skarmeta Gomez, A.F.: SecRBAC: secure data in the clouds (2015)
Dixit, R.K., Ravindranath, K.: Encryption techniques and access control models for data security: a survey (2018)
Dixit, R.K., Ravindranath, K.: Identity based proxy re-encryption with null deduplication for secure communication in cloud environment (2019)
Bernabe, J.B., Calero, J.M.A. Clemente, F.J.G., Perez, G.M.: Semantic-aware multi-tenancy authorization system for cloud architectures (2012)
Bernabe, J.B., Perez, G.M., Skarmeta, A.: Intercloud trust and security decision support system: an ontology-based approach (2015)
Velumadhava Rao, R., Selvamanib, K.: Data security challenges and its solutions in cloud computing (2015)
Alhenaki, L., Alwatban, A., Alahmri, B., Alarif, N.: Security in cloud computing: a survey system design (2019)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dixit, R., Ravindranath, K. (2022). Enhancement in Security for Intercloud Scenario with the Help of Role-Based Access Control Model. In: Senjyu, T., Mahalle, P., Perumal, T., Joshi, A. (eds) IOT with Smart Systems. Smart Innovation, Systems and Technologies, vol 251. Springer, Singapore. https://doi.org/10.1007/978-981-16-3945-6_27
Download citation
DOI: https://doi.org/10.1007/978-981-16-3945-6_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3944-9
Online ISBN: 978-981-16-3945-6
eBook Packages: EngineeringEngineering (R0)