SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7732
Authentication and Access Control for Cloud Computing Comparing
Problem Issues and Solutions
Prof. Rohini S. Pawar1, Prof. Sairabi H. Mujawar2
1Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India.
2Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Now a day’s all users to used latest technology
and currently most popular cloud based system or technique.
But in this technique is very useful and fast. What about the
security and its major problems. In this paper we discusses
about pros and cons. The emergence of pervasive cloud
computing has supported the transition of physical data and
machine into virtualization environment. However, security
threat and privacy have been identified as a challenge to
support the widespread adoption of cloud among user.
Moreover, user awareness on the importance of cloud
computing has increase the needs to safeguard the cloud by
implementing access control that works on dynamic
environment. Therefore, the emergence of Risk-Adaptable
Access Control (RAdAC) as a flexible medium in handling
exceptional access request is a great countermeasure to deal
with security and privacy challenges. However, the rising
problem in safeguarding users' privacy in RAdAC model has
not been discussed in depth by other researcher. This paper
explores the architecture of cloud computing and defines the
existing solutions influencing the adoption of cloud among
user. At the same time, the obscurity factor in protecting
privacy of user is found within RAdAC framework. Similarly,
the two-tier authentication scheme in RAdAC has been
proposed in responding to security and privacy challenges as
shown through informal security analysis.
Key words: Security; privacy, Access Controls, cloud
computing; risk access control; authentication.
1. INTRODUCTION
There has been a growing trend to store data in the cloud
with the dramatic increase in the amount of digital
information such as consumer’s personal data to larger
enterprises. They want to back up databases or store
archival data. Cloud data storage can be attractive for users
(individuals or enterprises) because it provides
unpredictable storage demands,requiringcheapstorage tier
or a low cost and long-term archive. Service providers can
focus more on the design of functions for enhance user
experience of their services without worrying about
resources to store the growing amount of data by
outsourcing clients data to the cloud. Cloud can provide on
demand resources so it can help service providers to
decrease their maintenance costs. Besides,cloudstoragecan
give a flexible and convenient way for users to access their
data from anywhere on any device or gadget. There are
distinctive sorts of infrastructures associatedwitha cloud.A
public cloud is a cloud which is made accessible to the
general public and also resources are allocated in a pay-as-
you-go manner. A private cloud is an internal cloud that is
built and operated by a single organization or association.
The organization has full control on the private cloud. The
private cloud cannot be accessed by external parties. Thus a
private cloud is frequently consideredtobemoresecureand
trusted.
1.1 Related Work
Now a day, secure data access control has become one of the
major concerns in a cloud storage system. As a logical
combination of attribute-based encryption and attribute-
based signature, attribute-based signcryption (ABSC) can
provide con_dentiality and an anonymousauthentication for
sensitive data and is more ef_cientthantraditional ``encrypt-
then-sign'' or ``sign-then-encrypt'' strategies. Thus, ABSC is
Suitable for _ne-grained access control in a semi-trusted
cloud environment and is gaining more and more attention
in recent years.
1.2 Problems and Solutions.
Table- 1: SECURITY ISSUE AND EXISTING SOLUTION IN
CLOUD COMPUTING
Author Security Issues Existing Solution
Subashini and
Kavitha
confidentiality and
data access.
virtualization.
authentication and
identity
management.
Service Level
Agreement (SLA).
framework.
and access control.
Zissis and Lekkas
privacy. management.
framework.
cryptography
encryption.
control.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7733
Shahzad
(DoS).
security.
Integrity,confidential
ity and data
availability.
control.
management.
authentication.
Y. Liu et al.
control.
virtualization.
control.
management.
Suzic et al.
management.
trust.
control.
cryptography for
encryption.
Hepsiba and J.G.R.
Sathiasee-lan
(DoS).
confidentiality and
data availability.
and access control.
information security.
protocol.
In addition, the level of privacy in the cloud
environment could help to preservetheconfidentialityofthe
data while protecting user identity. Whereas, level of
reliability relies on effective cloudmanagement byproviding
storage and communications to cater user needs. Thus, the
level of privacy and reliability are the dependent factor to
support the development of cloud technology in an
organization.
Fig- 1: Adaptation of Cloud Computing Architecture
Cloud computing is the internet-based technology that
includes a storage service and communication, efficient
resource management and incurs minimal cost. In addition,
cloud computing imposed on virtualization technology in
providing computing resourcesbasedonuser’srequirement
[19]. Based on standard definition by National Institute of
Standards and Technology (NIST), cloud computing is a
model that allows network accesstoresourcesonconfigured
computing (network, servers, applications, storage hub and
services) with minimal administration or interaction [20].
Cloud computing architecture as Fig. 1 consists of four
different layers which are standard definition, key features,
and service and deployment model. The standard definition
of cloud acts as the first layer that shape the key features of
cloud computing. Next, the second layer consists of five key
characteristics of the cloud that drives consumer
engagement in service model and deployment model.
Sometimes they know the location at a high-level
abstraction, such as country, state, and data center. Storage,
processing, memory, and network are the kind of resources
that are assigned. Rapid elasticity is also one of the cloud
computing characteristics, which means that resources are
dynamically increased when needed and decreased when
there is no need. Also, one of characteristics that a consumer
Needs is measured service in order to know how much is
Consumed. Also, it is needed by the cloud provider in order
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7734
to know how much the consumer has used in order to bill
him or her.
2. Infrastructures of Cloud Security.
Fig- 2: Cloud Security Infrastructure1
A single enterprise may provide many application
services to end-users. E-mail servers and web servers are
examples of application services providers. As company’s
boundaries broaden, the number of application services
grows. Mostly all service providers should authenticate
clients before service transactions are executed, because
they are dealing with personal information. This means that
the client should have security context for each application
server and log in before it can consume any service. The
same situation happens when the client accesses resources
in different security domains. As mentioned in the second
chapter, having many security credentialsforauthentication
purposes is not an effective solution from security, system
coordination, and management perspectives. While
organizations migrate to cloud environments, the same
problem still exists.
Cloud model is composed of five essential
characteristics, three service models, and four deployment
models as in the figure 3. In this technology users outsource
their data to a server outside their premises, which is run by
a cloud provider [4]. In addition, memory, processor,
bandwidth and storage arevisualizedandcanbeaccessed by
a client using the Internet [5]. Cloud computing is composed
of many technologies such as service oriented architecture,
virtualization, web 2.0 and more. There are many security
issues with cloud computing. However, the cloud is needed
by organizations due to the need for abundant resources to
be used in high demand and the lack of enough resources to
satisfy this need. Also,cloudcomputingoffers highlyefficient
data retrieval and availability.Cloudproviders aretaking the
responsibility of resource optimization.
Fig- 3: Schematic definition of cloud computing
Fig- 4: Cloud Security Infrastructure2
Mobile cloud computing is using the mobile as front end and
the cloud as back end for the storage andcomputation.In the
figure, mobile cloud computing consists of mobile
computing, cloud computing, andnetwork. In,threeschemes
are proposed for confidentiality and integrity of mobile
device’s files stored in the cloud. The first scheme is
encryption based Scheme (EnS). In this scheme, the mobile
device encrypts the file and gets its hash code. The
encryption key is a concatenation of the password entered
by a user, file name changed to bits and file size to defend
brute force attack on a cloud server since the length of the
password is limited. Only the file name is kept in the file and
everything related to the file is deleted. When downloading
the file from the cloud server, onlythepasswordisneededto
decrypt the file. This process will need more processing on
the mobile device side.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7735
Future Points.
Fig- 5: Multi-cloud computing
Cloud computing now is moving to multi-cloud computing
Because of security issues stemming from using a single
cloud such data availability. This figure 16 shows how the
clients connect to the clouds. Some of the issues that multi-
cloud computing are data availability and security ,Cachinet
et al. said Services of single clouds are still subject to outage.
There is a fear among organizations that a single cloud
would not fulfill their demands such as reliability and
availability. Some organizations need the availability to be
high and need their data to be far from being locked in.
Therefore, they need a system that is always available and
not under control of a single cloud provider.
3. CONCLUSION
Implementations of cloud security solutions under the
concept of Security as a Service are in their awaking phase.
This research has proposeda cloudsecuritysystembased on
That concept and made contributions in the area of
authentication and authorization services for a cloud
environment. The problem has been solved and the goals
have been achieved.
ACKNOWLEDGEMENT
We are honored to work with our supervisor,PrincipalR.R.
Utturkar, and we would like to thank him for his support
and patient guidance during our master work.
We are also thankful to the whole Computer Department
team for a helpful collaboration.
Finally, we would like to thank our whole family for their
encouragement and invaluable support during this work
period.
REFERENCES
[1] Meva and C. K. Kumbharana, “Issues and challenges
of security in cloud computing environment.,” Int. J.
Adv. Netw. Appl., pp. 108–111, 2015.
[2] S. Abolfazli, Z. Sanaei, A. Tabassi, S. Rosen, A. Gani,
and S. U. Khan, “Cloud adoption in Malaysia:Trends,
opportunities, and challenges,”IEEECloudComput.,
vol. 2, no. 1, pp. 60–68, 2015.
[3] L. Wei et al., “Security and privacy for storage and
computation in cloud computing,” Inf. Sci. (Ny).,vol.
258, pp. 371–386, 2014.
[4] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and
privacy challenges in cloud computing
environments,” IEEE Secur. Priv., vol. 8, no. 6, pp.
24–31, 2010.
[5] N. Fotiou, A. Machas, G. C. Polyzos, and G.
Xylomenos, “Access control as a service for the
cloud,” J. Internet Serv. Appl., vol. 6, no. 1, 2015.
[6] A. H. Karp, H. Haury, and M. H. Davis, “From ABAC
to ZBAC : The evolution of access control models,”
ISSA J., no. April, pp. 22–30, 2010.
[7] M. Mulimani and R. Rachh, “Analysis of access
control methods in cloudcomputing,”no.July,2016.
[8] V. Boyko, P. Mackenzie, and S. Patel, “Provably
secure password-authenticated key exchangeusing
Diffie-Hellman,” Eurocrypt, vol. 2, pp. 156–171,
2000.
[9] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From RBAC
to ABAC: constructing flexible data access control
for cloud storage services,” IEEE Trans. Serv.
Comput., vol. 8, no. 4, pp. 601–616, 2015.
[10] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grainedaccess
control of encrypted data,” Proc. 13th ACM Conf.
Comput. Commun. Secur. - CCS ’06, p. 89, 2006.
[11] A. Sudarsono, M. U. Harun, and A. Rasyid, “Secure
data sensor in environmental monitoring system
using attribute-based encryption with revocation,”
vol. 7, no. 2, pp. 609–624, 2017.
[12] D. Ricardo dos Santos, R. Marinho, G. Roecker
Schmitt, C. Merkle Westphall, and C. Becker
Westphall, “A framework and risk assessment
approaches for risk-based access control in the
cloud,” 2016.
[13] B. Suzic, A. Reiter, F. Reimair, D. Venturi, and B.
Kubo, “Secure data sharing and processing in
heterogeneous clouds,” Procedia Comput. Sci., vol.
68, no. 316, pp. 116–126, 2015.
[14] S. Subashini and V. Kavitha, “A survey on security
issues in service delivery models of cloud
computing,” J. Netw. Comput. Appl., vol. 34, no. 1,
pp. 1–11, 2011.
[15] Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, and A. V. Vasilakos, “A
survey of security and privacy challenges in cloud
computing: Solutions and future directions,” J.
Comput. Sci. Eng., vol. 9, no. 3, pp. 119–133, 2015.
[16] C. L. Hepsiba and J.G.R.Sathiaseelan,“Security issues
in service models of cloud computing,” Int. J.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7736
Comput. Sci. Mob. Comput., vol. 5, no. 3, pp. 610–
615, 2016.
[17] D. Zissis and D. Lekkas, “Addressing cloud
computing security issues,” Futur. Gener. Comput.
Syst., vol. 28, no. 3, pp. 583–592, 2012.
[18] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and J. L.
Hoon, “A strong user authentication framework for
cloud computing,” in Proceedings - 2011 IEEE Asia-
Pacific Services Computing Conference, APSCC
2011, 2011, pp. 110–115.
[19] C. G. Song, N. Y. Hwang, H. C. Yu, and J. B. Lim, “A
dynamic resource manager with effective resource
isolation based on workload types in virtualized
cloud computing environments,” Int. J.Adv.Sci.Eng.
Inf. Technol., vol. 7, no. 5, pp. 1771–1776, 2017.
[20] P. Mell and T. Grance, “The NIST definition of cloud
computing recommendations of the National
Institute of Standards and Technology,” Nist Spec.
Publ., vol. 145, p. 7, 2011.
[21] B. Hari Krishna, S. Kiran, G. Murali, and R. Pradeep
Kumar Reddy, “Security issues in service model of
cloud computing environment,” in Procedia
Computer Science, 2016,vol. 87,pp.246–251.Nurul
Elliza asmin and Mohammad Khatim Hasan,
“Framework for the implementation of E-
Government system based on cloud computing for
Malaysian public sector,” Ejournal.Ukm.My, vol. 7,
no. 1, pp. 1–18, 2018.
[22] Sairabi Mujawar, “Prediction of Heart Diseaseusing
Modified K-means and by using Naive Bayes”, in
International Journal of Innovative Research in
Computer and Communication Engineering, Vol. 3,
Issue 10, October 2015.
[23] Sairabi Mujawar, Prakash Devale, “Heart Disease
Prediction Using ModifiedK Means AndUsingNaive
Baiyes”, International Journal of ComputerSciences
and Engineering, Volume-3, Issue-10, 2015.
BIOGRAPHIES
Ph.D. Research Scholar,
Department of Computer
Technology, BVJNIOT, Pune, India.
Ph.D. Research Scholar,
Department of Computer
Technology, BVJNIOT, Pune, India.
She had completed graduation in
BE in Computer Engineering from
Bharati Vidyapeeth college of
Engineering, Mumbai University,
Navi Mumbai, Maharashtra, India
in 2007.

More Related Content

What's hot (20)

PDF
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
PDF
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
 
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
PDF
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
 
PDF
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
PDF
70 74
Editor IJARCET
 
PDF
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
PDF
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
PDF
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
 
PDF
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
PDF
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
PDF
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
PDF
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
PDF
G033030035
ijceronline
 
PDF
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
PDF
Cloud Computing Security Issues and Challenges
CSCJournals
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
 
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
 
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
 
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
G033030035
ijceronline
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
Cloud Computing Security Issues and Challenges
CSCJournals
 

Similar to IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions (20)

PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
PPTX
Unit -3.pptx cloud Security unit -3 notes
Ramya Nellutla
 
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf
 
PDF
Security policy enforcement in cloud infrastructure
csandit
 
PDF
A Systematic Review Paper On Cloud Security
Sandra Long
 
PPTX
Cloud security
Niharika Varshney
 
PDF
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
PDF
Cloud Computing
Azhar Hassan
 
PDF
Thesis_Final_Afnan_27072016_EngD (1)
Dr. Afnan Ullah Khan
 
PDF
Cloud security issues and concerns
Mrinal Baowaly
 
PDF
journal paper
rikaseorika
 
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
PDF
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
 
PDF
Security Issues in Cloud Computing - A Review
Eswar Publications
 
PDF
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET Journal
 
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
PDF
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
RTF
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
 
PDF
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
PDF
Examining Cloud Computing's Data Security Problems and Solutions: Authenticat...
pmaheswariopenventio
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
Unit -3.pptx cloud Security unit -3 notes
Ramya Nellutla
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf
 
Security policy enforcement in cloud infrastructure
csandit
 
A Systematic Review Paper On Cloud Security
Sandra Long
 
Cloud security
Niharika Varshney
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
Cloud Computing
Azhar Hassan
 
Thesis_Final_Afnan_27072016_EngD (1)
Dr. Afnan Ullah Khan
 
Cloud security issues and concerns
Mrinal Baowaly
 
journal paper
rikaseorika
 
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
 
Security Issues in Cloud Computing - A Review
Eswar Publications
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET Journal
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
Examining Cloud Computing's Data Security Problems and Solutions: Authenticat...
pmaheswariopenventio
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPTX
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PPTX
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PPTX
原版一样(EC Lille毕业证书)法国里尔中央理工学院毕业证补办
Taqyea
 
PPTX
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
PDF
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PDF
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PPTX
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
PPTX
仿制LethbridgeOffer加拿大莱斯桥大学毕业证范本,Lethbridge成绩单
Taqyea
 
PPTX
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
PPTX
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
PPTX
Alan Turing - life and importance for all of us now
Pedro Concejero
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PDF
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
PDF
Bachelor of information technology syll
SudarsanAssistantPro
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
UNIT 1 - INTRODUCTION TO AI and AI tools and basic concept
gokuld13012005
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
原版一样(EC Lille毕业证书)法国里尔中央理工学院毕业证补办
Taqyea
 
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
仿制LethbridgeOffer加拿大莱斯桥大学毕业证范本,Lethbridge成绩单
Taqyea
 
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
Alan Turing - life and importance for all of us now
Pedro Concejero
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
Bachelor of information technology syll
SudarsanAssistantPro
 

IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7732 Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions Prof. Rohini S. Pawar1, Prof. Sairabi H. Mujawar2 1Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. 2Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Now a day’s all users to used latest technology and currently most popular cloud based system or technique. But in this technique is very useful and fast. What about the security and its major problems. In this paper we discusses about pros and cons. The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis. Key words: Security; privacy, Access Controls, cloud computing; risk access control; authentication. 1. INTRODUCTION There has been a growing trend to store data in the cloud with the dramatic increase in the amount of digital information such as consumer’s personal data to larger enterprises. They want to back up databases or store archival data. Cloud data storage can be attractive for users (individuals or enterprises) because it provides unpredictable storage demands,requiringcheapstorage tier or a low cost and long-term archive. Service providers can focus more on the design of functions for enhance user experience of their services without worrying about resources to store the growing amount of data by outsourcing clients data to the cloud. Cloud can provide on demand resources so it can help service providers to decrease their maintenance costs. Besides,cloudstoragecan give a flexible and convenient way for users to access their data from anywhere on any device or gadget. There are distinctive sorts of infrastructures associatedwitha cloud.A public cloud is a cloud which is made accessible to the general public and also resources are allocated in a pay-as- you-go manner. A private cloud is an internal cloud that is built and operated by a single organization or association. The organization has full control on the private cloud. The private cloud cannot be accessed by external parties. Thus a private cloud is frequently consideredtobemoresecureand trusted. 1.1 Related Work Now a day, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute- based signature, attribute-based signcryption (ABSC) can provide con_dentiality and an anonymousauthentication for sensitive data and is more ef_cientthantraditional ``encrypt- then-sign'' or ``sign-then-encrypt'' strategies. Thus, ABSC is Suitable for _ne-grained access control in a semi-trusted cloud environment and is gaining more and more attention in recent years. 1.2 Problems and Solutions. Table- 1: SECURITY ISSUE AND EXISTING SOLUTION IN CLOUD COMPUTING Author Security Issues Existing Solution Subashini and Kavitha confidentiality and data access. virtualization. authentication and identity management. Service Level Agreement (SLA). framework. and access control. Zissis and Lekkas privacy. management. framework. cryptography encryption. control.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7733 Shahzad (DoS). security. Integrity,confidential ity and data availability. control. management. authentication. Y. Liu et al. control. virtualization. control. management. Suzic et al. management. trust. control. cryptography for encryption. Hepsiba and J.G.R. Sathiasee-lan (DoS). confidentiality and data availability. and access control. information security. protocol. In addition, the level of privacy in the cloud environment could help to preservetheconfidentialityofthe data while protecting user identity. Whereas, level of reliability relies on effective cloudmanagement byproviding storage and communications to cater user needs. Thus, the level of privacy and reliability are the dependent factor to support the development of cloud technology in an organization. Fig- 1: Adaptation of Cloud Computing Architecture Cloud computing is the internet-based technology that includes a storage service and communication, efficient resource management and incurs minimal cost. In addition, cloud computing imposed on virtualization technology in providing computing resourcesbasedonuser’srequirement [19]. Based on standard definition by National Institute of Standards and Technology (NIST), cloud computing is a model that allows network accesstoresourcesonconfigured computing (network, servers, applications, storage hub and services) with minimal administration or interaction [20]. Cloud computing architecture as Fig. 1 consists of four different layers which are standard definition, key features, and service and deployment model. The standard definition of cloud acts as the first layer that shape the key features of cloud computing. Next, the second layer consists of five key characteristics of the cloud that drives consumer engagement in service model and deployment model. Sometimes they know the location at a high-level abstraction, such as country, state, and data center. Storage, processing, memory, and network are the kind of resources that are assigned. Rapid elasticity is also one of the cloud computing characteristics, which means that resources are dynamically increased when needed and decreased when there is no need. Also, one of characteristics that a consumer Needs is measured service in order to know how much is Consumed. Also, it is needed by the cloud provider in order
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7734 to know how much the consumer has used in order to bill him or her. 2. Infrastructures of Cloud Security. Fig- 2: Cloud Security Infrastructure1 A single enterprise may provide many application services to end-users. E-mail servers and web servers are examples of application services providers. As company’s boundaries broaden, the number of application services grows. Mostly all service providers should authenticate clients before service transactions are executed, because they are dealing with personal information. This means that the client should have security context for each application server and log in before it can consume any service. The same situation happens when the client accesses resources in different security domains. As mentioned in the second chapter, having many security credentialsforauthentication purposes is not an effective solution from security, system coordination, and management perspectives. While organizations migrate to cloud environments, the same problem still exists. Cloud model is composed of five essential characteristics, three service models, and four deployment models as in the figure 3. In this technology users outsource their data to a server outside their premises, which is run by a cloud provider [4]. In addition, memory, processor, bandwidth and storage arevisualizedandcanbeaccessed by a client using the Internet [5]. Cloud computing is composed of many technologies such as service oriented architecture, virtualization, web 2.0 and more. There are many security issues with cloud computing. However, the cloud is needed by organizations due to the need for abundant resources to be used in high demand and the lack of enough resources to satisfy this need. Also,cloudcomputingoffers highlyefficient data retrieval and availability.Cloudproviders aretaking the responsibility of resource optimization. Fig- 3: Schematic definition of cloud computing Fig- 4: Cloud Security Infrastructure2 Mobile cloud computing is using the mobile as front end and the cloud as back end for the storage andcomputation.In the figure, mobile cloud computing consists of mobile computing, cloud computing, andnetwork. In,threeschemes are proposed for confidentiality and integrity of mobile device’s files stored in the cloud. The first scheme is encryption based Scheme (EnS). In this scheme, the mobile device encrypts the file and gets its hash code. The encryption key is a concatenation of the password entered by a user, file name changed to bits and file size to defend brute force attack on a cloud server since the length of the password is limited. Only the file name is kept in the file and everything related to the file is deleted. When downloading the file from the cloud server, onlythepasswordisneededto decrypt the file. This process will need more processing on the mobile device side.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7735 Future Points. Fig- 5: Multi-cloud computing Cloud computing now is moving to multi-cloud computing Because of security issues stemming from using a single cloud such data availability. This figure 16 shows how the clients connect to the clouds. Some of the issues that multi- cloud computing are data availability and security ,Cachinet et al. said Services of single clouds are still subject to outage. There is a fear among organizations that a single cloud would not fulfill their demands such as reliability and availability. Some organizations need the availability to be high and need their data to be far from being locked in. Therefore, they need a system that is always available and not under control of a single cloud provider. 3. CONCLUSION Implementations of cloud security solutions under the concept of Security as a Service are in their awaking phase. This research has proposeda cloudsecuritysystembased on That concept and made contributions in the area of authentication and authorization services for a cloud environment. The problem has been solved and the goals have been achieved. ACKNOWLEDGEMENT We are honored to work with our supervisor,PrincipalR.R. Utturkar, and we would like to thank him for his support and patient guidance during our master work. We are also thankful to the whole Computer Department team for a helpful collaboration. Finally, we would like to thank our whole family for their encouragement and invaluable support during this work period. REFERENCES [1] Meva and C. K. Kumbharana, “Issues and challenges of security in cloud computing environment.,” Int. J. Adv. Netw. Appl., pp. 108–111, 2015. [2] S. Abolfazli, Z. Sanaei, A. Tabassi, S. Rosen, A. Gani, and S. U. Khan, “Cloud adoption in Malaysia:Trends, opportunities, and challenges,”IEEECloudComput., vol. 2, no. 1, pp. 60–68, 2015. [3] L. Wei et al., “Security and privacy for storage and computation in cloud computing,” Inf. Sci. (Ny).,vol. 258, pp. 371–386, 2014. [4] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Secur. Priv., vol. 8, no. 6, pp. 24–31, 2010. [5] N. Fotiou, A. Machas, G. C. Polyzos, and G. Xylomenos, “Access control as a service for the cloud,” J. Internet Serv. Appl., vol. 6, no. 1, 2015. [6] A. H. Karp, H. Haury, and M. H. Davis, “From ABAC to ZBAC : The evolution of access control models,” ISSA J., no. April, pp. 22–30, 2010. [7] M. Mulimani and R. Rachh, “Analysis of access control methods in cloudcomputing,”no.July,2016. [8] V. Boyko, P. Mackenzie, and S. Patel, “Provably secure password-authenticated key exchangeusing Diffie-Hellman,” Eurocrypt, vol. 2, pp. 156–171, 2000. [9] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From RBAC to ABAC: constructing flexible data access control for cloud storage services,” IEEE Trans. Serv. Comput., vol. 8, no. 4, pp. 601–616, 2015. [10] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grainedaccess control of encrypted data,” Proc. 13th ACM Conf. Comput. Commun. Secur. - CCS ’06, p. 89, 2006. [11] A. Sudarsono, M. U. Harun, and A. Rasyid, “Secure data sensor in environmental monitoring system using attribute-based encryption with revocation,” vol. 7, no. 2, pp. 609–624, 2017. [12] D. Ricardo dos Santos, R. Marinho, G. Roecker Schmitt, C. Merkle Westphall, and C. Becker Westphall, “A framework and risk assessment approaches for risk-based access control in the cloud,” 2016. [13] B. Suzic, A. Reiter, F. Reimair, D. Venturi, and B. Kubo, “Secure data sharing and processing in heterogeneous clouds,” Procedia Comput. Sci., vol. 68, no. 316, pp. 116–126, 2015. [14] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, 2011. [15] Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, and A. V. Vasilakos, “A survey of security and privacy challenges in cloud computing: Solutions and future directions,” J. Comput. Sci. Eng., vol. 9, no. 3, pp. 119–133, 2015. [16] C. L. Hepsiba and J.G.R.Sathiaseelan,“Security issues in service models of cloud computing,” Int. J.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7736 Comput. Sci. Mob. Comput., vol. 5, no. 3, pp. 610– 615, 2016. [17] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012. [18] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and J. L. Hoon, “A strong user authentication framework for cloud computing,” in Proceedings - 2011 IEEE Asia- Pacific Services Computing Conference, APSCC 2011, 2011, pp. 110–115. [19] C. G. Song, N. Y. Hwang, H. C. Yu, and J. B. Lim, “A dynamic resource manager with effective resource isolation based on workload types in virtualized cloud computing environments,” Int. J.Adv.Sci.Eng. Inf. Technol., vol. 7, no. 5, pp. 1771–1776, 2017. [20] P. Mell and T. Grance, “The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology,” Nist Spec. Publ., vol. 145, p. 7, 2011. [21] B. Hari Krishna, S. Kiran, G. Murali, and R. Pradeep Kumar Reddy, “Security issues in service model of cloud computing environment,” in Procedia Computer Science, 2016,vol. 87,pp.246–251.Nurul Elliza asmin and Mohammad Khatim Hasan, “Framework for the implementation of E- Government system based on cloud computing for Malaysian public sector,” Ejournal.Ukm.My, vol. 7, no. 1, pp. 1–18, 2018. [22] Sairabi Mujawar, “Prediction of Heart Diseaseusing Modified K-means and by using Naive Bayes”, in International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 10, October 2015. [23] Sairabi Mujawar, Prakash Devale, “Heart Disease Prediction Using ModifiedK Means AndUsingNaive Baiyes”, International Journal of ComputerSciences and Engineering, Volume-3, Issue-10, 2015. BIOGRAPHIES Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. She had completed graduation in BE in Computer Engineering from Bharati Vidyapeeth college of Engineering, Mumbai University, Navi Mumbai, Maharashtra, India in 2007.