Data accessing based on the popularity value for cloud computing

Nowadays, Big Data (BD) is one of the advanced areas of Information Technology (IT) sector. BD can be explained as a large volume of file or data. Since there are many hackers and malicious users over the internet, it is very important to distinguish between the authorized and unauthorized users for securing the confidentiality of BD. Access control method allows data accessing of an authorized user. In recent years, file or data access control is a very challenging issue in BD. Existing access control schemes mainly focus on the confidentiality of the data storage from the unauthorized users. In this paper, a novel file or data access control scheme has been presented. The proposed scheme allows reducing the searching cost and accessing time, while providing BD to the user. It also minimizes the problem of data redundancy.

[1]  Yun Liu,et al.  Read and reply behaviors in a BBS social network , 2010, 2010 2nd International Conference on Advanced Computer Control.

[2]  Yu Zhang,et al.  FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[3]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[4]  Pinki Roy,et al.  Time efficient secure DNA based access control model for cloud computing environment , 2017, Future Gener. Comput. Syst..

[5]  Abhishek Majumder,et al.  Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .

[6]  Huang Xiuli,et al.  Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.

[7]  Pinki Roy,et al.  Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..

[8]  Ahmad Khademzadeh,et al.  A Three-Layer Access Control Architecture Based on UCON for Enhancing Cloud Computing Security , 2012 .

[9]  Mateusz Dzida,et al.  On popularity-based load balancing in content networks , 2012, 2012 24th International Teletraffic Congress (ITC 24).

[10]  SK Hafizul Islam,et al.  An effective key distribution for secure internet pay-TV using access key hierarchies , 2016, Secur. Commun. Networks.

[11]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Pinki Roy,et al.  A new secure authentication scheme for cloud computing environment , 2017, Concurr. Comput. Pract. Exp..

[13]  Abdul Raouf Khan,et al.  ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .

[14]  Pinki Roy,et al.  A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..

[15]  B. Balamurugan,et al.  Extensive Survey on Usage of Attribute Based Encryption in Cloud , 2014 .

[16]  Muttukrishnan Rajarajan,et al.  Secure data access in cloud computing , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.

[17]  P. Venkata Krishna,et al.  An Efficient Framework for Health System Based on Hybrid Cloud with ABE-Outsourced Decryption , 2015 .

[18]  Gail-Joon Ahn,et al.  Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[20]  Chittaranjan Hota,et al.  Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .

[21]  Jie Wu,et al.  A connectivity-based popularity prediction approach for social networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[22]  Ryan Ausanka-Crues,et al.  Methods for Access Control : Advances and Limitations , 2006 .

[23]  Lili Sun,et al.  A purpose based usage access control model , 2010 .

[24]  Madjid Merabti,et al.  An access control model for cloud computing , 2014, J. Inf. Secur. Appl..

[25]  Binoy Krishna Roy,et al.  Nonlinear Active Control Based Hybrid Synchronization between Hyperchaotic and Chaotic Systems , 2014 .

[26]  Saroj K. Biswas,et al.  Redundancy-driven modified Tomek-link based undersampling: A solution to class imbalance , 2017, Pattern Recognit. Lett..

[27]  Rui Jiang,et al.  A Novel Data Access Scheme in Cloud Computing , 2012 .

[28]  Pinki Roy,et al.  Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[29]  Ripon Patgiri,et al.  A Deep Dive into the Hadoop World to Explore Its Various Performances , 2016 .

[30]  Xin Wang,et al.  Popularity-driven coordinated caching in Named Data Networking , 2012, 2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[31]  Abhishek Majumder,et al.  Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[32]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[33]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[34]  Binoy Krishna Roy,et al.  A Novel hyperchaotic System with Stable and Unstable Line of Equilibria and Sigma Shaped Poincare Map , 2016 .