Security framework of KCABE in SAAS model

Authors

  • M Sangeetha Department of Computer Science and Engineering, Fatima Michael College of Engineering and Technology, Anna University, Madurai, Tamil Nadu, India
  • Neela V School of Computing and Information Technology, REVA University, Bangalore, Karnataka, India

Keywords:

KCABE, SAAS, authorization, authentication

Abstract

Cloud computing extends its usage to the public in enormous ways. Basically cloud computing is manufactured by three service models. Each model provides its application based on user requirements. This is the cause of reaching cloud computing to the public in short period. Especially to provide data security is used as main aspect . it assures to provide security in IT sectors,business,hospital,administration ..etc. in this paper we focus and rectify security issues of SAAS model by applying KCABE algorithm. The main security threat of SAAS are data access, authorization and authentication. these security threads are overcome by KCABE because of associating set of user attributes with access tree structure. By this concept, client does not depend on providers security measures during data access.

References

Patel, N. S., & Rekha, B. S. (2014). Software as a Service (SaaS): security issues and solutions. International Journal of Computational Engineering Research, 4(6), 68-71.

Sangeetha, M., & Karthik, P. V. (2017, March). To provide a secured access control using combined hybrid key-ciphertext attribute based encryption (KC-ABE). In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1-4). IEEE.

Swapnil, C., & BR, M. (2016). Secure Data Retrieval based on Attribute-based Encryption in Cloud. International Journal of Computer Applications, 134(13), 31-35.

Ahmed, S. T., Singh, D. K., Basha, S. M., Nasr, E. A., Kamrani, A. K., & Aboudaif, M. K. (2021). Neural Network Based Mental Depression Identification and Sentiments Classification Technique From Speech Signals: A COVID-19 Focused Pandemic Study. Frontiers in public health, 9.

Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2014). A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing, 3(2), 233-244.

Touati, L., & Challal, Y. (2016, May). Collaborative kp-abe for cloud-based internet of things applications. In 2016 IEEE International Conference on Communications (ICC) (pp. 1-7). IEEE.

Dhanasekaran, S., & Vasudevan, V. (2015). A dynamic multi-intelligent agent system for enhancing the cloud service negotiation. International Journal of Applied Engineering Research, 10(43), 30469-30473.

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265-1277.

Xia, Z., Zhang, L., & Liu, D. (2016). Attribute-based access control scheme with efficient revocation in cloud computing. China Communications, 13(7), 92-99.

Ma, H., Liu, L., Zhou, A., & Zhao, D. (2015). On networking of internet of things: Explorations and challenges. IEEE Internet of Things Journal, 3(4), 441-452.

Dhanasekaran, S., & Vasudevan, V. J. C. C. (2019). A Cognizant agent system for optimizing cloud service searching strategy. Cluster Computing, 22(6), 13381-13386.

Ahmed, S. T., Sreedhar Kumar, S., Anusha, B., Bhumika, P., Gunashree, M., & Ishwarya, B. (2018, November). A Generalized Study on Data Mining and Clustering Algorithms. In International Conference On Computational Vision and Bio Inspired Computing (pp. 1121-1129). Springer, Cham.

Ahmed, S. S. T., & Patil, K. K. (2016, March). Novel breast cancer detection technique for TMS-India with dynamic analysis approach. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-5). IEEE.

Al-Shammari, N. K., Alzamil, A. A., Albadarn, M., Ahmed, S. A., Syed, M. B., Alshammari, A. S., & Gabr, A. M. (2021). Cardiac Stroke Prediction Framework using Hybrid Optimization Algorithm under DNN. Engineering, Technology & Applied Science Research, 11(4), 7436-7441.

Downloads

Published

2022-11-05

How to Cite

M Sangeetha, & Neela V. (2022). Security framework of KCABE in SAAS model. International Journal of Human Computations & Intelligence, 1(3), 8–12. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/33