Enhanced Framework for Verifying User Authorization and Data Correctness Using Token Management System in the Cloud

被引:0
|
作者
Balamurugan, B. [1 ]
Krishna, P. Venkata [1 ]
Devi, Nirmala M. [1 ]
Meenakshi, R. [1 ]
Abinaya, V [1 ]
机构
[1] VIT Univ, Vellore, Tamil Nadu, India
关键词
Token Management System; Access control; MUTUAL AUTHENTICATION SCHEME;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is an application and set of services given through the internet. However it is an emerging technology for shared infrastructure but it lacks with an access rights and security mechanism. As it lacks security issues for the cloud users our system focuses only on the security provided through the token management system. It is based on the internet where computing is done through the virtual shared servers for providing infrastructure, software, platform and security as a services. In which security plays an important role in the cloud service. Hence, this security has been given with three types of services such as mutual authentication, directory services, token granting for the resources. Since, existing token issuing mechanism does not provide scalability to large data sets and also increases memory overhead between the client and the server. Hence, our proposed work focuses on providing tokens to the users, which addresses the problem of scalability and memory overhead. The proposed framework of token management system monitors the entire operations of the cloud and there by managing the entire cloud infrastructure. Our model comes under the new category of cloud model known as "Security as a Service". This paper provides the security framework as an architectural model to verify user authorization and data correctness of the resource stored thereby provides guarantee to the data owner for their resource stored into the cloud. This framework also describes about the storage of token in a secured manner and it also facilitates search and usage of tokens for auditing purpose and supervision of the users.
引用
收藏
页码:1443 / 1447
页数:5
相关论文
共 50 条
  • [1] Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN
    Hu, Chunling
    Geng, Guoqing
    Li, Bixin
    Tang, Chao
    Wang, Xiaofeng
    2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 210 - 216
  • [2] A SURVEY ON VARIOUS APPROACHES FOR VERIFYING CORRECTNESS AND COMPLETENESS OVER THE CLOUD DATA
    Suvetha, S.
    Arul, V.
    Sasikala, G.
    IIOAB JOURNAL, 2016, 7 (09) : 616 - 623
  • [3] Lightweight Management of Authorization Update on Cloud Data
    Cui, Zongmin
    Zhu, Hong
    Shi, Jie
    Chi, Lianhua
    Yan, Ke
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2013), 2013, : 456 - 461
  • [4] Using ASP for knowledge management with user authorization
    Zhao, Lingzhong
    Qian, Junyan
    Chang, Liang
    Cai, Guoyong
    DATA & KNOWLEDGE ENGINEERING, 2010, 69 (08) : 737 - 762
  • [5] Privacy Token Technique for Protecting User's Attributes in a Federated Identity Management System for the Cloud Environment
    Abur, Maria M.
    Junaidu, Sahalu B.
    Abdullahi, Saleh E.
    Obiniyi, Afolayan A.
    2019 2ND INTERNATIONAL CONFERENCE OF THE IEEE NIGERIA COMPUTER CHAPTER (NIGERIACOMPUTCONF), 2019, : 270 - 279
  • [6] Using Virtualization Technology for the User Authorization System
    Polenov, Maxim
    Guzik, Vyacheslav
    Lukyanov, Vladislav
    SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3, 2017, 575 : 192 - 200
  • [7] User-Centric Cloud Framework for Enhanced Data Security by Applying UK Algorithm
    Umapathy, B.
    Kalpana, G.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 42 - 51
  • [8] Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System
    Balusamy, Balamurugan
    Venkatakrishna, P.
    Vaidhyanathan, Abinaya
    Ravikumar, Meenakshi
    Munisamy, Nirmala Devi
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 25 - 31
  • [9] A framework for user driven data management
    Scott, Mark
    Boardman, Richard P.
    Reed, Philippa A.
    Austin, Tim
    Johnston, Steven J.
    Takeda, Kenji
    Cox, Simon J.
    INFORMATION SYSTEMS, 2014, 42 : 36 - 58
  • [10] An enhanced data security and trust management enabled framework for cloud computing systems
    Cindhamani, J.
    Punya, Naguboynia
    Ealaruvi, Rasha
    Babu, L. D. Dhinesh
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,