Volume 2 , Issue 1 , PP: 8-14, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
Pooja 1 * , Dr. Manish Kumar Mukhija 2 , Satish Kumar Alaria 3
Doi: https://doi.org/10.54216/JCHCI.020101
In modern world of advancement, cloud technology is taking its grip. COVID-19 also enhance the use of the cloud services. The cloud concept comes with the new advancement of technology, but with that data breaches and data hacks are also increasing. In the cloud-based environment, we suggested the model of security enhancement which, make use pf role-based security model where the files are shared according to the role and the access of such file is controlled using TPA validation and apart for that the concept of authentication of user is also suggested using the Pattern Lock based graphical system for pattern formation. The pattern obtained are validated using the various of online password or pattern strength validation tools, results which are obtained proves that pattern obtained through the proposed concept performs better against the attack.
Cloud Environment, Cloud Security, TPA, Role Based Access.
1. Akkaoui, R., Hei, X., Guo, C., & Cheng, W. (2019). RBAC-HDE: On the design of a role-based access control
with Smart contract for healthcare data exchange IEEE International Conference on Consumer Electronics—
Taiwan (ICCE-TW), Yilan, Taiwan, 2019 (pp. 1–2).
2. Alaria, S. K., & Kumar, A. (2018). Implementation of new Cryptographic Encryption Approach for Trust as &
Service (TAAS) in Cloud Environment. International Journal of Computers and Applications, 4(July–
August)(8), (2250–1797).
3. Belkhiria, H., Fakhfakh, F., & Rodriguez, I. B. (2020). Resolving multi-user conflicts in a Smart building using
RBAC IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative
Enterprises (WETICE), Bayonne, France, 2020 (pp. 181–186).
4. Ghafoorian, M., Abbasinezhad-Mood, D., & Shakeri, H. (April 1 2019). A thorough trust and reputation based
RBAC model for secure data storage in the cloud. In IEEE Transactions on Parallel and Distributed Systems,
5. Mu, Z., & Liu, M. (2019). Enterprise rights management system based on RBAC model International
Conference on Robots and Intelligent System (ICRIS), Haikou, China, 2019 (pp. 234–237).
6. S.R. shree, A. Chilambu Chelvan and M. Rajesh. (2020). Optimization of Secret Key using cuckoo Search
Algorithm for ensuring data integrity in TPA International Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India, 2020 (pp. 1–5).
7. Rao, K. R., Ray, I. G., Asif, W., Nayak, A., & Rajarajan, M. (2019). R-PEKS: RBAC enabled PEKS for secure
access of cloud data. In IEEE Access, 7, 133274–133289. https://doi.org/10.1109/ACCESS.2019.2941560
8. Singh, V. P., Kumar, M., & Arora, H. (May/June 2020), ISSN: 0193-4120. Enhanced image security technique
with combination of Arnold transformation and RSA algorithm. International Journal of Test Engineering and
Management, 83, 30550–30560.
9. Soni, K., & Kumar, S. (2019). Comparison of RBAC and ABAC security models for private cloud
International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon),
Faridabad, India, 2019 (pp. 584–587).
10. Suganthy, A., & Prasanna Venkatesan, V. (2019). An introspective study on dynamic role-centric RBAC
models IEEE International Conference on System, Computation, Automation and Networking (ICSCAN),
Pondicherry, India, 2019 (pp. 1–6).
11. Thakare, A., Lee, E., Kumar, A., Nikam, V. B., & Kim, Y. (April 2020). PARBAC: Priority-attribute-based
RBAC model for Azure IoT cloud. In IEEE Internet of Things Journal, 7(4), 2890–2900.
https://doi.org/10.1109/JIOT.2019.2963794
12. Zou, Y., Deng, J., Xu, C., Liang, X., & Chen, X. (2019). Semantic rule based RBAC extension model for
flexible resource allocation 12th International Symposium on Computational Intelligence and Design (ISCID),
Hangzhou, China, 2019 (pp. 221–224)