A CERTIFICATE-DRIVEN APPROACH TO ACCESS CONTROL IN FUTURE INTERNET.
- Sinhgad Institute Of Technology And Sciences, Savitribai Phule Pune University, Pune, India.
- Smt. Kashibai Navale College Of Engineering, Savitribai Phule Pune University, Pune, India.
- Abstract
- Keywords
- References
- Cite This Article as
- Corresponding Author
The growing impact of the Internet in all walks of human life has also introduced us to newer problems related to security and hence the increasing demands to address such threats that prevail. The Future Internet (FI) being a confluence of various technologies, and the cloud being one such component technology in the FI that provides storage as a prominent service amongst the other services offered by it, it follows that the public cloud cannot be trusted at all times and therefore cannot be completely relied upon to regulate access to the stored sensitive data that it contains. This creates an avenue for collusion attack by the cloud and a malicious user. This has been addressed in our proposed system by the separation of access policy and access structure. Further considering the insecure communications and the vulnerability of the transmitted data, a mutual identity establishment scheme has been proposed to secure the channel and therefore the contents in transit. A recurrence relation for the established scheme has been derived to calculate its time complexity and the time taken to achieve mutual authentication has been administered for repeated iterations and the values thus obtained have been plotted and verified under the normal distribution bell curve to suggest the model?s consistency and adaptability.
- Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, ?Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud?, IEEE Transactions On Parallel and Distributed?? Systems,Vol. 24, No. 6, June 2013.
- Li, I. Koutsopoulos, and R. Poovendran, ?Optimal jamming attacks and network defense policies in wireless sensor networks,? in? Proc. IEEE INFOCOM, May 2007, pp. 1307-1315.Lan Zhou, Vijay Varadharajan, and Michael Hitchens, AchievingSecure Role-Based Access Control on Encrypted Data in Cloud Storage,IEEE Transactions On InformationForensics and Security, Vol. 8, No.12, December 2013.
- Kan Yang, XiaohuaJia, KuiRen, Bo Zhang andRuitaoXie, DACMACS: Effective DataAccessControl for Multiauthority Cloud Storage Systems, IEEE TransactionsOn Information Forensics And ???????????? Security, Vol. 8, No.11, November 2013.
- Aldar C.-F. Chan, and JianyingZhou,CyberPhysical Device Authentication for the Smart Grid Electric Vehicle Ecosystem,IEEEJournal on selected areas in communications, Vol.32, No. 7, JULY 2014
- David Fernndez-Lpez and Francisco Javier Lpez,Authentication, Authorization, and Accounting in WebRTCPaaSInfrastructures,IEEEInternet Computing,pp: 34-40,Issue No.06,vol.18, Nov-Dec 2014
- Hong Liu, HuanshengNing, QuigxuXiong, Lawrence T. Yang,Share Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing, IEEE Transactions On Parallel and Distributed Systems, Vol 26, No. 1, January 2015
- Simone Cirani, Marco Picone, Pietro Gonizzi, Luca Veltri, and GianluigiFerrari,IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoTScenarios,IEEE Sensors Journal, Vol. 15, No. 2, February 2015
- HuanshengNing, Laurence T. Yang,Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things,IEEETransactions on Parallel and Distributed Systems,Vol. 26, No. 3, March 2015
- SushmitaRuj, Milos Stojmenovic, Amiya Nayak,Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds,IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014
- Noureddine, R. Bashroush,An Authentication Model towards Cloud Federation in the Enterprise,The Journal of Systems and Software,Volume 86, Issue 9, pp 22692275 September 2013
- Nancy Ambritta P., Poonam N. Railkar and Parikshit N. Mahalle,Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach,Journal of ICT, Vol. 2 1, 136, July, 2014
- Parikshit N. Mahalle, BayuAnggorojati, Neeli R. Prasad and Ramjee Prasad, Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things,Journal of Cyber Security and Mobility, Vol. 1, 309348, February 2013
- Nancy Ambritta??????????????? , ?????????? Poonam ??????????????? N. ?????????? Railkar?? and ??????? Parikshit??????????????? N. Mahalle ,? Collaborative Mutual Identity Establishment (CMIE) for the? Future Internet, IJPCC
[Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle. (2017); A CERTIFICATE-DRIVEN APPROACH TO ACCESS CONTROL IN FUTURE INTERNET. Int. J. of Adv. Res. 5 (Mar). 2042-2049] (ISSN 2320-5407). www.journalijar.com
Sinhgad Institute of Technology and Sciences,Pune,India