Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding
Abstract
TBDSA and GA algorithms takes minimum time to
Cloud computing is one the promising and emerging field
execute and raises the system performance.
in Information Technology because of its performance, low
cost and great availability. Cloud computing basically
Keywords
gives services to an individual and the organization
through the network with the capability to scale down or Token Based Data Security Algorithm, RSA and AES,
up their different kinds of services. The basic service of Genetic Algorithm, Role Based Access Control Model
cloud computing system is known as a cloud storage
system which containing a collection of storage servers. 1. Introduction
These storage servers gives long-term storage services by
using the internet with free of cost. However, the storing The cloud is a term which is utilized for a virtual
data using cloud system of third party causes very serious collection of resources and it has wide range of
problem over data confidentiality. Typically, different
advantages. These advantages are offered for cloud users to
kinds of encryption schemes are used to protect the cloud
utilize the availability of vast array of software applications,
data confidentiality, but it take more time to process even
looking unlimited storage, to access the lightning fast power
a single operation. Thus, in this paper proposes cloud data
of processing and the ability to effortlessly share information
confidentiality by integrates encoding, encrypting and
across the world [1]. Cloud users access all of these
forwarding. Token Based Data Security Algorithm
advantages over the internet at any place and any time. Cloud
(TBDSA) along with RSA and AES is used for decryption
computing is also allows corporate and consumers structure to
and encryption process and Role Based Access Control
utilize all the cloud application without added any extra effort
Model (RBACM) is access at the time of data forwarding.
for hardware and software installation. Additionally, it offers
Here, cloud users accessing password is created by using
personal files sharing process from any computer over the
encoding process which is done by Genetic Algorithm
internet access [2].
(GA) and process of GA is presented in this paper. This
No
The proposed system has four main entities such as Hybrid
Exit
Cloud, Administrator, Role Manager, and Owner. Initially the
setup a hybrid cloud in the process, the administrator is known
as main authority and the authority creates the cloud users
Figure 1Secure Cloud Storage System with Trust
username and password for and generates the secret key for Management
role corresponding role manager, here have to define the role
hierarchy. Manage the given user name and password by using Hybrid Cloud:
role manager and the owner is the cloud user who has the
authority to store or upload the cloud data securely in the In this proposed system two main cloud frameworks are used
cloud system. The users want to decrypt to access the stored such as private and public cloud. In this integration may
cloud data. The proposed cloud storage and accessing system overcome the each other disadvantages. The private cloud will
is as shown in figure 1. not be exists from the user, so the user only interact with the
public cloud over the administrator. The administrator will be
permit to access the private cloud.
Administrator:
this work the owner manages the relationship between roles Round Key (128 bit)
Pre-round Transformation
and their permission. Owner performs the encryption process Cipher Key (128,
192, or 256 bits)
for that it does not need any password or secret key. Round 1
Key Expansion
User: Round 2
10
Key size
128
12 192
14 256
Users are known as general cloud users who have specific Round Relationship between
number of rounds and
work according to their skills. Every user is authenticated by cipher key size
the administrator. Users are permitted only for downloading 128 bit Cipher text
In this proposed work Role Based Access Control Model Basically, the AES algorithm initiated with Add round key
(RBACM) is proposed. Thus, the roles manager assigns the stage than it will followed by nine rounds of four different
each role to the cloud user who can work with their stages and a 10th round of three different stages. Here, the
appropriate role. The cloud provider is not able to find the data four different stages are defined as Substitute bytes, Mix
which is stored in the form of encrypted data. A role manager Columns,Shift rows, and Add Round Key. AES working
is able to allocate a role for specific user after the data owner process is as shown in figure 2. Initially, the nine rounds of
has encrypted the data. A user allocated to specific role can be AES decryption process contain Inverse Substitute
revoked at any time, the revoked user have not any access bytes,Inverse Shift rows,Inverse Mix Columns andInverse
permission to data. The user revocation will not affect other Add Round Key. Again the 10th round not executesthe Inverse
cloud users. This work, achieves a great encryption and Mix Columns stage as same as 9th round as shown in figure 2.
decryption process on client side.
The RSA algorithm used for measured the encoding and
In this, initially required to create the cloud user, allocate the decoding AES secret key. Let S is defined as the secret key
specific roles to the user and this process comprises and C is defined as the cipher key then at encryption is defined
As the architecture of proposed system shows cloud security Step 8: send the generated password to could users mobile
or mail
utilizing OTP by using GA in figure 1. Initially Admin upload
the data on cloud so that each and every register cloud user Step 9:REPEATSTEP 4 TO 5
can access the cloud data with using their specific role. For Figure 4 Data Recovery Process
accessing data user required to do two important processes
such as user registration and submission of OTP. From the 4. Results and discussion
architecture registered user want to access the cloud data, the
user must be logged in. After login the user gets their OTP on Different kind of methods are utilized to employing RBACM
mail or mobile and when user gets the OTP they should enter and encryption and decryption processes to cloud secure
in the system correctly. If OTP correct the system will permit storage system such as Anonymous HIBE [14],HDFS with
for data accessing otherwise the system will ask correct OTP. AIS [8] and these algorithm are compared with proposed
The data recovery using GA is as shown in Figure 4. system such as RBACM with GA. In this work successful
done in Netbeans JAVA version 7.0 as a frontend and backend
Data Recovery using Genetic Algorithm is used as DERBY database.
Step 1: When cloud user : = ,
THEN NEW ACCOUNT CREATED & CLIENT In figure 5 shows the comparison of communication
REGISTERED. complexity in three different algorithms such asAnonymous
HIBE,HDFS with AIS and proposed RBACM with GA. From
Step 2: IF cloud
the figure 6 results can see that the communication cost
: = _ is generated on
that Token FOR SPECIFIC CLOUD SERVICE. riseswhen the data block size increases, but in the proposed
system shows promising results in term of communication
Steps 3: THEN cloud user cost when compared with other two algorithms such as
SEND Anonymous HIBE,HDFS with AIS.
: =
_
with Data Security.
Step 4: (_: = )
{
Authenticated user.
}
ELSE
{
Intruder (Fake user).
}
References
[10]R. H. Sakr, F. Omara, O. Nomir, An Optimized [14] Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee,
Technique for Secure Data Over Cloud OS, International Anonymous HIBE with Short Ciphertexts: Full Security in
Prime Order Groups, arXiv:1502.07812v1 [cs.CR], 2015.