Multilevel Security Framework Based Resource Sharing Using Bilinear Mapping in Cloud Environment

During the last decade internet users, researchers and industries have focused on the cloud based technologies. Cloud technology is a distributed and scalable service model and in this model service providers offer the services depending on the cloud users. Security in cloud is a challenge for the service providers , data owners and the service requesters because the cloud providers provide various services such as storage, computing , database and network . All the services focus on data processing in a network to share the information from cloud to users, data owner to cloud and cloud to authenticator. To solve these security issues, in this paper we define a new approach for data sharing issues and service management of Trusted Third Party Authentication ( TPA ) based on multilevel security framework and bilinear pairing techniques. This framework consists of three modules and these modules are service module, transaction processing module and security module . The next thing is bilinear pairing technique, which uses the pairing techniques to achieve the secure cloud service and improve the computing utility power , store large amount of data and execute the efficient encryption process securely in cloud environment. In this work, the cloud ssecurity requirement has been enhanced using bilinear mapping and multilevel security framework . The result of multilevel security framework is comparatively better than the present day cloud security.

[1]  R. K. Bunkar,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2014 .

[2]  Latha Tamilselvan,et al.  Trusted Computing Model with Attestation to Assure Security for Software Services in a Cloud Environment , 2017 .

[3]  Rengarajan Amirtharajan,et al.  Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique , 2016, Int. J. Digit. Multim. Broadcast..

[4]  S. Udhayakumar,et al.  An adaptive trust model for software services in hybrid cloud environment , 2011 .

[5]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[6]  Haibo Chen,et al.  Daonity - Grid security from two levels of virtualization , 2007, Inf. Secur. Tech. Rep..

[7]  Jin Li,et al.  Enabling efficient and secure data sharing in cloud computing , 2014, Concurr. Comput. Pract. Exp..

[8]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[9]  Tahira Mahboob,et al.  Adopting information security techniques for cloud computing—A survey , 2016, 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE).

[10]  Shyan-Ming Yuan,et al.  Design and Implementation of File Deduplication Framework on HDFS , 2014, Int. J. Distributed Sens. Networks.

[11]  Tan Shuang,et al.  An efficient method for checking the integrity of data in the Cloud , 2014, China Communications.

[12]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[13]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[14]  G. Murali,et al.  Security Issues in Service Model of Cloud Computing Environment , 2016 .