ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Cognitive Human-Computer Interaction

ISSN
Online: 2771-1463 Print: 2771-1471
Frequency

Continuous publication

Publication Model

Open access journal. All articles are freely available online with no APC.

Journal of Cognitive Human-Computer Interaction
Full Length Article

Volume 2Issue 1PP: 8-14 • 2022

Smart City's Security Model for Management of Image Data on Cloud

Pooja 1* ,
Manish Kumar Mukhija 1 ,
Satish Kumar Alaria 2
1Department of Computer Science & Engineering, AIET, Jaipur, India
2Department of Electronics & Communication, AIET, Jaipur, India
* Corresponding Author.
Received: June 25, 2021 Accepted: November 25, 2021

Abstract

In modern world of advancement, cloud technology is taking its grip. COVID-19 also enhance the use of the cloud services. The cloud concept comes with the new advancement of technology, but with that data breaches and data hacks are also increasing. In the cloud-based environment, we suggested the model of security enhancement which, make use pf role-based security model where the files are shared according to the role and the access of such file is controlled using TPA validation and apart for that the concept of authentication of user is also suggested using the Pattern Lock based graphical system for pattern formation. The pattern obtained are validated using the various of online password or pattern strength validation tools, results which are obtained proves that pattern obtained through the proposed concept performs better against the attack.

Keywords

Cloud Environment Cloud Security TPA Role Based Access

References

1. Akkaoui, R., Hei, X., Guo, C., & Cheng, W. (2019). RBAC-HDE: On the design of a role-based access control with Smart contract for healthcare data exchange IEEE International Conference on Consumer Electronics— Taiwan (ICCE-TW), Yilan, Taiwan, 2019 (pp. 1–2).

2. Alaria, S. K., & Kumar, A. (2018). Implementation of new Cryptographic Encryption Approach for Trust as & Service (TAAS) in Cloud Environment. International Journal of Computers and Applications, 4(July– August)(8), (2250–1797).

3. Belkhiria, H., Fakhfakh, F., & Rodriguez, I. B. (2020). Resolving multi-user conflicts in a Smart building using RBAC IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Bayonne, France, 2020 (pp. 181–186).

4. Ghafoorian, M., Abbasinezhad-Mood, D., & Shakeri, H. (April 1 2019). A thorough trust and reputation based RBAC model for secure data storage in the cloud. In IEEE Transactions on Parallel and Distributed Systems,

5. Mu, Z., & Liu, M. (2019). Enterprise rights management system based on RBAC model International Conference on Robots and Intelligent System (ICRIS), Haikou, China, 2019 (pp. 234–237).

6. S.R. shree, A. Chilambu Chelvan and M. Rajesh. (2020). Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020 (pp. 1–5).

7. Rao, K. R., Ray, I. G., Asif, W., Nayak, A., & Rajarajan, M. (2019). R-PEKS: RBAC enabled PEKS for secure access of cloud data. In IEEE Access, 7, 133274–133289. https://doi.org/10.1109/ACCESS.2019.2941560

8. Singh, V. P., Kumar, M., & Arora, H. (May/June 2020), ISSN: 0193-4120. Enhanced image security technique with combination of Arnold transformation and RSA algorithm. International Journal of Test Engineering and Management, 83, 30550–30560.

9. Soni, K., & Kumar, S. (2019). Comparison of RBAC and ABAC security models for private cloud International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Faridabad, India, 2019 (pp. 584–587).

10. Suganthy, A., & Prasanna Venkatesan, V. (2019). An introspective study on dynamic role-centric RBAC models IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2019 (pp. 1–6).

11. Thakare, A., Lee, E., Kumar, A., Nikam, V. B., & Kim, Y. (April 2020). PARBAC: Priority-attribute-based RBAC model for Azure IoT cloud. In IEEE Internet of Things Journal, 7(4), 2890–2900. https://doi.org/10.1109/JIOT.2019.2963794 

12. Zou, Y., Deng, J., Xu, C., Liang, X., & Chen, X. (2019). Semantic rule based RBAC extension model for flexible resource allocation 12th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 2019 (pp. 221–224)

Cite This Article

Choose your preferred format

format_quote
, Pooja, Mukhija, Manish Kumar, Alaria, Satish Kumar. "Smart City's Security Model for Management of Image Data on Cloud." Journal of Cognitive Human-Computer Interaction, vol. Volume 2, no. Issue 1, 2022, pp. 8-14. DOI: https://doi.org/10.54216/JCHCI.020101
, P., Mukhija, M., Alaria, S. (2022). Smart City's Security Model for Management of Image Data on Cloud. Journal of Cognitive Human-Computer Interaction, Volume 2(Issue 1), 8-14. DOI: https://doi.org/10.54216/JCHCI.020101
, Pooja, Mukhija, Manish Kumar, Alaria, Satish Kumar. "Smart City's Security Model for Management of Image Data on Cloud." Journal of Cognitive Human-Computer Interaction Volume 2, no. Issue 1 (2022): 8-14. DOI: https://doi.org/10.54216/JCHCI.020101
, P., Mukhija, M., Alaria, S. (2022) 'Smart City's Security Model for Management of Image Data on Cloud', Journal of Cognitive Human-Computer Interaction, Volume 2(Issue 1), pp. 8-14. DOI: https://doi.org/10.54216/JCHCI.020101
P, Mukhija M, Alaria S. Smart City's Security Model for Management of Image Data on Cloud. Journal of Cognitive Human-Computer Interaction. 2022;Volume 2(Issue 1):8-14. DOI: https://doi.org/10.54216/JCHCI.020101
P. , M. Mukhija, S. Alaria, "Smart City's Security Model for Management of Image Data on Cloud," Journal of Cognitive Human-Computer Interaction, vol. Volume 2, no. Issue 1, pp. 8-14, 2022. DOI: https://doi.org/10.54216/JCHCI.020101
Digital Archive Ready