Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption

Abstract Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. The Internet of Things (IoT) is an atmosphere in which all physical objects, peoples or animals are having unique identity and they are able to transfer data over a network without any interaction. An improvement in electronic sensing devices and rapid growth in communication infrastructure, and their monitoring systems give very fast access to retrieve data and allow communication with physical devices. Now days, Organizations use IoT devices to collect real time and continuous data and make better business decisions to increase customer satisfaction. But collected data need to be processed and transferred in appropriate format to store on storage system – which is triggering organizations to rethink their data storage infrastructures. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. The proposed work allows the organization to store the IoT data on the cloud securely by applying different Access control policies and the cryptography concepts.

[1]  Raman Maini,et al.  COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .

[2]  Ravi S. Sandhu,et al.  The RRA97 model for role-based administration of role hierarchies , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[3]  Ravi S. Sandhu,et al.  The ARBAC99 model for administration of roles , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[4]  Ravi S. Sandhu,et al.  The ARBAC97 model for role-based administration of roles: preliminary description and outline , 1997, RBAC '97.

[5]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.

[6]  Hossam Faris,et al.  Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review , 2014 .

[7]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[8]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[9]  William Stallings,et al.  Cryptography and network security (2nd ed.): principles and practice , 1998 .

[10]  Bhagyashri Katole,et al.  Principle Elements and Framework of Internet of Things , 2013 .

[11]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Elisa Bertino,et al.  The next generation of access control models: Do we need them and what should they be? , 2001 .

[14]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[15]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[16]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[17]  R. Davis,et al.  The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.

[18]  W. L. Ruzzo,et al.  Analysis of DAC MAC RBAC Access Control based Models for Security , 2017 .

[19]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[20]  D BokefodeJayant.,et al.  Analysis of DAC MAC RBAC Access Control based Models for Security , 2014 .

[21]  S. Nirmala,et al.  Data Security Issues and Challenges in Cloud Computing , 2015 .

[22]  Daniel K. Fisher Rapid Deployment of Internet-Connected Environmental Monitoring Devices , 2014, IOT 2014.