N.R.Rejin Pauland D.Paul Raj
1R M K College of Engineering and Technology,Puduvoyal,Gummidipoondi, 601206,India
2R M D Engineering College,Kavaraipettai,Gummidipoondi, 601206,India
Abstract:Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced.Trust-based security played a vitalrole in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distributionenvironments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework, trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.
Keywords: Cloud computing; trust; access control; cloud service provider;cloud data user; CSTA
Cloud computing is an open standard model, which can empower universal computing and pride request-based access to a pool of configurable computing devices.It is a promising cuttingedge computing worldview that fundamentally depends on innovations, for example, virtualization,utility computing, Service Oriented Architecture, etc.It is Internet-driven and gives the entirety of its assets as administrations, for example, stockpiling, calculation and correspondence.It is a one-of-a-kind mix of capacities and development innovations.It needs negligible administration exertion from specialist co-ops and conveys versatile and dynamic foundation, remote access, and use control and evaluating [1].With the rise of enterprise-level cloud computing activities, cloud computing has become more of a reality than just an idea [2].
Since a cloud domain includes different assets having numerous customers cooperating in difficult habits, appropriate access control to these assets is essential [3].The idea of trust will compare to many relations among substances interested in a social procedure.These relations all around include two substances, the specialist co-op is named trustor, and the subject expecting access to the administrations of trustor is named trustee.Trust foundation depends on the information or encounters gathered from the past associations of substances.Since in any relationship,trust precedes approval, there is a compelling need for research towards a trust-based security environment and instrumentation inside cloud condition.Nonetheless, there exist not many trusts the board models in cloud computing condition [4].
Both the cloud clients and specialist co-ops ought to have a confided relationship.(i.e.,) Both elements ought to be trusted.Be that as it may, many works consider it confided in clients as it were.In [5], different degrees of trust is viewed as, for example, client’s trust, supplier’s trust,gadget’s trust dependent on which various jobs are allocated.Be that as it may, it neglects to rattle off the components considered for trust assessment.In [6], the intra-area and between-space trusts are resolved depending on the client connection and administration fulfillment.In any case,it ought to consider the server’s remaining burden and disappointment probabilities.In [7], the client’s criticism, the server’s outstanding task at hand, and the number of solicitation dismissals made by the server are considered for trust estimation.However, it neglects to consider the trust value of cloud clients.
To overcome the issues mentioned above, we propose a trust-based access control framework for a multi-cloud environment.The proposed ACM is designed based on server-level trust value and user-level trust value.Using this method, we can avoid unauthorized user login.To further tighten the security to avoid data leakage, the stored data is encrypted with the CSTA algorithm’s help.In this way, we can avoid sensitive information loss and un-authorized user login processes.The significant contribution of the proposed methodology is listed below;
? A novel user-server trust-based access control mechanism is proposed to overcome the intrusion of the unauthorized user.
? CSTA algorithm is used to encrypt data to avoid data leakage on communications.
? The proposed system is compared with existing systems in terms of various evaluation metrics like encryption, decryption time, running time, memory consumed, success rate, and access delay.
Many researchers have developed various access control mechanisms on the cloud.Indrajit Ray has planned a trust-based access control model in such access control models, which characterizes many components and relations between those components with trust-based limitations characterized on these relations.To support access verification of applications and data in cloud infrastructure, a trusted cloud client was set up to run diagnostic tests using the cryptographic hash-based test.Additionally, Yuyu Bie et al.have planned to provide a trust-based access control instrument for a multi-space cloud environment.Right off the bat, trust value is introduced among clients and cloud storage.Also, the contrast between intra-area trust and intra-space trust is analyzed.Besides, a role-based access control system joined with trust degree in multi-area is introduced.Access control in neighborhood space applies RBAC model joined with trust degree,while in multi-area it contains the origination of role interpretation.
Another security system was proposed around the same time [8], whereinto maintain the predefined trust levels, load offsetting observation on security conditions with proactive activities are monitored.A notoriety-based trust model assessed specialist organizations’notoriety [9] by utilizing a trust assessment calculation that will take clients’input, server dismissal rate, and server outstanding tasks at hand into thought.The trials show that the trust result is progressively effective.
Another trust-based model for security participation [10], named DBTEC, was built to advance vehicles’security collaboration in VCC.This joins the circuitous trust estimation in the Public security board and the immediate trust estimation in the Private security board to process the trust estimation of vehicles while picking agreeable accomplices; a reliable participation way producing a plan is proposed to guarantee the wellbeing of collaboration and increment the participation finishing rates in VCC.Correspondingly, Tawalbeh et al.[11] have read the cloudlet engineering for MCC.They discovered that utilizing this model improved the exhibition of numerous applications and lessened the system’s idleness.Numerous QoS components like accessibility,adaptability, and throughput were improved when utilizing the cloudlet model over non-cloudlet cloud engineering.Likewise, they introduced secure usage and model for the cloudlet MCC model utilizing the dynamic trust appointment procedure to give better security and protection to the client’s information in MCC.
In addition to all the trust-based systems under review, the encryption mechanism employed for data access plays a key role in deciding the integrity of the data and the system’s security in use.The initial models used are a modified Searchable Symmetric Encryption (SSE) algorithm called Two-Round Searchable Encryption (TRSE) [12] that helps in avoiding data leakage with major cipher text operation on the server-side.With the evolution on peer–to–peer cloud storage (P2P), the idea of Ciphertext Policy Attribute-Based Encryption (CP-ABE) with proxy re-encryption scheme [13,14] gained popularity as they provide secure and efficient access control.
As security in data storage became the priority, the validity of data came into the limelight.To ensure the credibility of the data accessed, Identity based Encryption on Revocable Storage(RS–IBE) elements was suggested [15].This forward/backward security of cyphertext showed better performance in the case of efficiency and functionality.However, [16] questioned this algorithm’s correctness and suggested using self-updatable encryption that could boost the RS-IBE algorithm’s performance.
As data protection became feasible and quite frankly mandatory in all cloud storage access,the degree of usability was the next performance metric that gained attention.Hence a data protection mechanism with a self-contained module called Role-based access control enhanced using data-centric attribute-based encryption (DC–RBAC) was popularized [17].The encryption was further strengthened by adding a trust value calculated using a Fuzzy Analytic Hierarchy Process (FAHP) [18] that provided better granularity and flexibility.Thus, add a trust value seemed like the best option to provide flexible yet best data security.
The most common encryption algorithm for access control was Ciphertext Policy-Driven Attribute-Based Encryption (CP-ABE).They form the basis for many mobile multimedia data sharing [19,20].In addition to other attributes, sometimes data creation and data access are also considered an attribute that helps in dual data access control and data integrity verifiability,thereby strengthening the CP-ABE one parameter at a time [21].After a thorough examination of different encryption algorithms and various access control models, it is clear that not many have dealt with trust values as the main factor, and even then, the concept of cyclic shifting is seldom heard.So, we have decided to proceed with our work along the tracks of cyclic shift-based encryption for securing data and a trust-based model for access control and compared its results with the existing models.
The outline of the system proposed is shown in Fig.1.The system consists of three entities,namely, data owner (DO), Data server (DS), and Cloud Service Provider (CSP).
Figure 1:System model
? Data Owner (DO)–DO is responsible for collecting the data from different resources.For security reasons and to avoid data loss, the collected data is encrypted before storage by the data owner.
? Cloud Service Provider (CSP)–CSP manages and stores data in the cloud.When the user wants data from CSP, a request is sent.If the request is valid, the CSP sends back the requested data.
? Data server (DS)–DS is responsible for checking the request sent to CSP and sending the secure data back to the user.This is done by checking the checksum in ACM.
The purpose of the proposed methodology is to securely transmit or store the data on the cloud using a trust-based access control mechanism with the CSTA approach.As to the growing size of data, industries now prefer cloud-based data storage.Due to the enormous amount of data floating around us, single-cloud-based storage is avoided as they face many issues like limited free storage, vendor lock-in, and data loss.Keeping these issues in mind, multi-cloud storage services are preferred as they provide a single platform configuration for multiple cloud storage services.Moreover, security is a key issue in this multi-cloud storage system.To avoid facing many security issues, in this paper, multi-level security frameworks are introduced.In the first level, data are encrypted using a novel algorithm called the CSTA algorithm and the second one is the trustbased access control mechanism.The former provides data security while the latter is to avoid the unauthorized user login process.
One of the key issues of the cloud is security.Due to security issues, companies are reluctant to store cloud data.Therefore, data confidentiality is an essential task in the cloud.To avoid this problem, CSDA has introduced an efficient security mechanism in this paper.The proposed CSTA algorithm does not depend on any centralized authority like the central management system.Using this can avoid major related issues.This method consists of two steps, namely, encryption and decryption.The encryption process is used to convert the original data into ciphertext.And decryption is the process of converting ciphertext into original data without losing original information.The step-by-step process of CSTA is explained below;
4.1.1 Encryption Process
Encryption is the process of original hiding information using secret codes.The encryption process is done using the CSTA algorithm that performs row and column transition-based partitioning and primary and secondary diagonal transformation.The encryption process is explained in detail in the following steps
Step 1:Let the input document containing data beDi.To start the process, the input documentDiis converted intoN×Nmatrix format.
Step 2:After that, the Shift Column (SC) operation is applied to theN×Nmatrix.The SC calculation is given in Eq.1.
whereshift(r,Mb)depends only on the key value.The key can take up any value between 0 and 9.It denotes the number of elements that need to be shifted, and the mod represents the arithmetic function.
Step 3:After the SC operation, the Shift Row (SR) operation is applied.The SR calculation is given in Eq.(2).
Step 4:Then, we performed Diagonal Shift (DS) operation.In DS operation, the diagonal elements from top left to right bottom are shifted.The DS function can be written as following,Eq.(3).
Step 5:Then, again, we perform the DS operation in the order given.The function can be written as Eq.(4);
Step 6:Then, the output is derived from the given values, Eq.(5).
Step 7:Now, the output is converted to ASCII format to obtain encrypted text.
Step 8:Finally, we compute the hash value with the timestamp to be sent along with the encrypted data and store it in the cloud.
4.1.2 Decryption Process
Decryption is the process of reversing the ciphertext of the encryption process to its original form.In general, all data sent from cloud servers are encrypted before transmission to the cloud user, who then decrypts it to retrieve the original message.The decryption process is explained below;
Step 1:Initially, the hash value is calculated along with a timestamp from the encrypted data,and this hash value and timestamp are transferred to the receiver.
Step 2:Then, encrypted data is converted into ASCII format.
Step 3:After that, the SR operation is applied into a specific order.
Step 4:Then, we applied SC operation in a specific order
Step 5:Then, the DS operation is applied diagonally.
Step 6:After that, again DS operation is applied to the output in a specific order.
Step 7:Finally, we obtain the decrypted output.
Malicious users have been a complicated problem in a cloud setup that jeopardizes the safety of communicating sensitive data.Access control models (ACM) play a vital role in implementing security for these sensitive data.Access control is checking the requests sent by every user and scrutinizing the legitimate ones from it.The request is either granted or denied based on the pre-defined control policies framed by different models.There are some ACMs proposed by various authors before.But due to the constantly revamping security needs and non-predictive user behaviors that make the sensitive data vulnerable, the models face many threats and challenges and require constant upgradation.To overcome this obstacle, A Trust-Based Access Control (TBAC)Framework is introduced.TBAC is designed based on the characteristics of the user and server.Fig.2 shows the architecture of the TBAC framework.
Figure 2:Architecture of TBAC-USC framework
In this framework, trust values are assigned to cloud users from direct and recommendation trust degrees.The trust degree is calculated by combining metrics such as number of successful interactions, index of service satisfaction, dishonesty for a user (access violations), number of failed interactions.Similarly, trust values are assigned to cloud servers based on the following metrics:server load, the number of rejected requests, and service access delay.Then RBAC is assigned to each cloud user after checking his current trust value.If his current trust value does not meet the necessary conditions pre-defined for this system, his request will be denied.Similarly,if the service provider fails to meet the minimum requirements, then another suitable provider will be selected.
4.2.1 Estimation of Trust Degree for Users(TRuser)
In the given domain, an interaction trust valueTRintis assigned when a userUjcompletes the interaction with another userUi.The value is determined based on the number of successful or failed transactions.The success rate afterkinteractions is given by Eq.(6).
where,No_Suc_IntandTot_Intrepresent the number of successful interactions and total interactions.
Similarly, the failure rate afterkinteractions is given by Eq.(7).
where,No_Fail_IntandTot_Intrepresent the number of failed interactions and total interactions.
The interaction trust value ofUiassigned byUjafter thekthinteraction is given by Eq.(8).
A service satisfaction index SSindex is assigned in the operation domain when an entity obtains multiple services from another entity.Afterkinteractions, theSSindexof userUiassigned by userUjis given by Eq.(9).
The service provider is capable of tracking the access privileges of any malicious userUi.Then, the dishonest level (DH) of userUiis calculated using Eq.(10).
where NO_AV represents the number of access violations performed byUi.
Then, the total trust degree of userUiover all other usersUj,j=1,2,...,ncan be derived as Eq.(11)
4.2.2 Estimation of Trust Degree for Cloud Server(TRS)
Initially, the server will be ideal.When a user sends service requests, all requests will be in the queue to get service.The server load is calculated using relative transaction timeTtransof service requests.The server’s delay time is noted while calculating the trust evaluation of each server.The Server Load (SL) with m user’s request is then given by Eq.(12).
whereTtrans(Ui)represents the transaction time of service request of userUi.
The request rejection rateRRrateof a server is based on the number of service requests rejected by the server.
whereNo_Rej_Reqrepresents the number of service requests of allmusers.
The service access delayDsais the time taken between issuing the service request to the CSP and obtaining access to the requested service, Eq.(14).
Trepand Treqare when the service reply is received and when the service request is issued,respectively, by usersUi,i=1,2,...,m.
Then the total trust degree of serverSican be derived as Eq.(15)
wherew1,w2andw3are weight values ranging from [0, 1].
A type of access control called Role-Based Access Control (RBAC) is predominantly used within organizations for administrating and controlling the type of concessions of communications.This is achieved using permissions on functional roles rather than individual identities.The access decisions depend on the users’roles within the organization, which furthers decides the users’membership.This paper combines trust parameters and access control models to provide a trust-based access control framework in the cloud computing environment.RBAC’s trust degree reflects cloud users’fundamental property, servers, and the transmitted resources.The Trusted Authority Centre (TAC) is responsible for access control authentication and trust management in the cloud computing environment.
In this framework, users can obtain their access rights initially based on their roles, but they need to possess the required trust degree to use the assigned rights.When a cloud user requests access to a cloud service or resource, the TAC will check whether the user’s trust level matches the threshold defined by the system.If the user’s request for access is authorized, TAC provides a certificate to the requested user to obtain permission to use the access rights corresponding to his role.The access control for cloud users based on their trust degree levels is shown in Tab.1.The threshold values T1, T2, and T3, are fixed based on theTRusertrust degree levels.
Table 1:Access control levels for different users based on trust degree
The following algorithm summarizes the steps involved in the Trust based access control for cloud users.
?
?
According to Algorithm-1, a user with a minor trust degree could not access the resources,and a user with the highest trust could perform all functions on the resources.
Once a user’s service request is received, the CSP will allocate a server based on its trust degree.The following algorithm summarizes the steps involved in the server selection process:
Algorithm 2:Algorithm for CSP Let {RS}={S1, S2, .....Sr} be the set of registered servers in a CSP.Let Uij be the set of users Ui who accessed the services from server Sj Let TRSth be the threshold value of the trust degree of a server 1.Start 2.For each user Uij 3.If Uij completes its service, then 4.Uij feedbacks its service completion status [accepted or rejected] and Dsa to TAC 5.End If 6.End For 7.TAC obtains SL (Sj) from CSP 8.The feedback of Uij, TAC computes RRrate using Eq.(8)9.TAC then calculates TRSj using Eq.(10)10.If TRSj <TRSth, then 11.TRSj is a trusted server 12.Else 13.TRSj is not trusted 14.TAC send notification about TRSi to CSP 15.CSP shifts all the resources and services to Sk, k images/BZ_64_2034_2820_2070_2866.png j 16.End If 17.Stop
In Algorithm 2, if the trust degree of a serverSjis below the thresholdTRSth, then that server will be removed by the CSP.All the resources and services corresponding toSjwill be shifted to another server whose trust degree is aboveTRSth.The subsequent service requests from the users will then be submitted to this new server.
To validate the TBAC-CSC framework presented in this paper, the implementation is done using a java-based CP-ABE toolkit and the Java Pairing-Based Cryptography library (JPBC).The proposed TBAC-CSC framework’s performance has been compared with the traditional RBAC model and TBAC policy scheme.The experiments are carried out using Java on the system with an Intel Core processor at 3.00 GHz and 4 GB RAM running Windows 7 Ultimate.The results are taken as an average of 10 trial data exchanges.Tab.2 shows the experimental settings used in the simulation.The available number of servers registered users and malicious users were fixed on values from the previous works studied to compare them.
Table 2:Experimental settings
The main objective is to securely store and transmit the data on multi-cloud using a trustbased access control mechanism with the CSTA approach.In this paper, ACM is utilized not to allow any unauthorized person to access the data.To further improve data security, the CSTA algorithm is utilized.The performance of the proposed methodology is analyzed in this section and is compared with different existing systems.Tab.3 shows the values for Running Time,Encryption Time, Decryption Time, Memory Size of Cyclic Shift Transposition Algorithm
Table 3:Evaluation metrics for CSTA algorithm
In Fig.3, the Running time of the proposed methodology is analyzed.For data security, in this paper CSTA algorithm is utilized.Our algorithm compared with two different cryptography algorithms, namely, Advanced Encryption Standard (AES) and Data Encryption Standard (DES),to prove the proposed methodology’s effectiveness.In Fig.3,X-axisshows the file size n KB,and the y-axis represents the running time in seconds.The proposed method takes 755s.to run 10000kbof data, which is 850s.When using the AES algorithm and 830s.when using the DES algorithm.Similarly, as file size increases, the running time also increases gradually.
Figure 3:Running time
The encryption time for varying data sizes is analyzed in Fig.4.A sound system should take minimum time for encrypting the data.When analyzing Fig.5, our proposed method is taken 153425sfor encrypting 2000kb, 175638sfor 4000kb, 196342sfor 6000kb, 202253sfor 8000kb,and 243263sfor 10000kbe.Compared to the existing method, the proposed method is taken minimum time for the encryption process.This is due to the decentralized architecture that does not depend on a third-party system for encryption.
Figure 4:Encryption time
Figure 5:Decryption time
The decryption time of varying file sizes is analyzed for the proposed method.When analyzing Fig.5, the proposed method taken minimum time to decrypt the data compared to existing methods.
Fig.6 shows the memory size (in bits) secured by the proposed method.Accordingly, our proposed method has taken 22152362bitsof memory for securing 2000kbfile, 23643725 bits for 4000kbfile, 25783425bitsfor 6000kbfile, 27563902bitsfor 8000kbfile, and 28764523bitsfor 10000kbfile.The memory utilization of existing methods are high compared to the proposed method.
Figure 6:Memory size
Fig.7 shows the success rate of service requests granted by the CSP based on user and server trust values.Success rate is directly proportional to the trust degree of a server, that is, when a service request is handled successfully by a server the level of reliability of the server increases.Since RBAC concentrates more on the role and not trust for users, it has the least success rate in users’presence, successful service requests for genuine users are low for RBAC.TBAC does not check the servers’trust value, and it achieves a lesser success rate than TBAC-CSC.Hence TBAC-CSC has a 6% higher success rate than RBAC and a 2% higher success rate than TBAC.
Figure 7:The success rate for service requests
Fig.8 shows the delay over various service requests for the varying number of users.It usually reflects the level of server trust.the delay in a service request is inversely proportional to the trust degree of the server, (i.e.,) when the delay is minimum the accessibility of the server increases.Since RBAC does not maintain any users’trust values, the service requests are usually not granted easily to malicious users.Hence the delay in service is higher.Since TBAC does not check the trust value of servers, it achieves a higher delay than TBAC-CSC.Hence TBAC-CSC has a 37%lesser delay rate than RBAC and 18% lesser delay than TBAC.
Figure 8:Service access delay for service requests
Fig.9 shows the trust value of servers.It shows that server 4 has the highest trust value,followed by servers 1, 3, and 2.The trust values can change based on the server load, service delay and so on which will be reflected in the graph.
Figure 9:Trust values of servers
This paper has presented a trust-based access control framework with secure data storage in a multi-cloud environment.A trust-based access control framework is based on user and server Characteristics.In this framework, trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions, service satisfaction index, and dishonesty level.In addition to this, trust values are assigned to cloud servers based on the metrics:server load, service rejection rate, and service access delay.The role-Based Access Control (RBAC) policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level, then another suitable server will be selected.Further, enhance data security, the data has been encrypted using CSTA and stored on the cloud.The basic CSTA algorithm is found to be sufficient for the current application.Enhancements to the algorithm can be done on demand for the future systems it is applied to Experimental results show that the proposed framework achieves reduced access delay with an increased success ratio compared to the RBAC model and TBAC scheme.
Funding Statement:The authors received no specific funding for this study.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
Computers Materials&Continua2021年12期