805 718
Full Length Article
Journal of Cognitive Human-Computer Interaction
Volume 2 , Issue 1, PP: 8-14 , 2022 | Cite this article as | XML | Html |PDF

Title

Smart City's Security Model for Management of Image Data on Cloud

  Pooja 1 * ,   Dr. Manish Kumar Mukhija 2 ,   Satish Kumar Alaria 3

1  Department of Computer Science & Engineering, AIET, Jaipur, India
    (poojasinghsfdc@gmail.com)

2  Department of Computer Science & Engineering, AIET, Jaipur, India
    (manishkrmukhija82@gmail.com)

3  Department of Electronics & Communication, AIET, Jaipur, India.
    (satish.alaria@gmail.com)


Doi   :   https://doi.org/10.54216/JCHCI.020101

Received: June 25, 2021 Accepted: November 25, 2021

Abstract :

In modern world of advancement, cloud technology is taking its grip. COVID-19 also enhance the use of the cloud services. The cloud concept comes with the new advancement of technology, but with that data breaches and data hacks are also increasing. In the cloud-based environment, we suggested the model of security enhancement which, make use pf role-based security model where the files are shared according to the role and the access of such file is controlled using TPA validation and apart for that the concept of authentication of user is also suggested using the Pattern Lock based graphical system for pattern formation. The pattern obtained are validated using the various of online password or pattern strength validation tools, results which are obtained proves that pattern obtained through the proposed concept performs better against the attack.

Keywords :

Cloud Environment , Cloud Security , TPA , Role Based Access.

References :

1. Akkaoui, R., Hei, X., Guo, C., & Cheng, W. (2019). RBAC-HDE: On the design of a role-based access control

with Smart contract for healthcare data exchange IEEE International Conference on Consumer Electronics—

Taiwan (ICCE-TW), Yilan, Taiwan, 2019 (pp. 1–2).

2. Alaria, S. K., & Kumar, A. (2018). Implementation of new Cryptographic Encryption Approach for Trust as &

Service (TAAS) in Cloud Environment. International Journal of Computers and Applications, 4(July–

August)(8), (2250–1797).

3. Belkhiria, H., Fakhfakh, F., & Rodriguez, I. B. (2020). Resolving multi-user conflicts in a Smart building using

RBAC IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative

Enterprises (WETICE), Bayonne, France, 2020 (pp. 181–186).

4. Ghafoorian, M., Abbasinezhad-Mood, D., & Shakeri, H. (April 1 2019). A thorough trust and reputation based

RBAC model for secure data storage in the cloud. In IEEE Transactions on Parallel and Distributed Systems,

5. Mu, Z., & Liu, M. (2019). Enterprise rights management system based on RBAC model International

Conference on Robots and Intelligent System (ICRIS), Haikou, China, 2019 (pp. 234–237).

6. S.R. shree, A. Chilambu Chelvan and M. Rajesh. (2020). Optimization of Secret Key using cuckoo Search

Algorithm for ensuring data integrity in TPA International Conference on Computer Communication and

Informatics (ICCCI), Coimbatore, India, 2020 (pp. 1–5).

7. Rao, K. R., Ray, I. G., Asif, W., Nayak, A., & Rajarajan, M. (2019). R-PEKS: RBAC enabled PEKS for secure

access of cloud data. In IEEE Access, 7, 133274–133289. https://doi.org/10.1109/ACCESS.2019.2941560

8. Singh, V. P., Kumar, M., & Arora, H. (May/June 2020), ISSN: 0193-4120. Enhanced image security technique

with combination of Arnold transformation and RSA algorithm. International Journal of Test Engineering and

Management, 83, 30550–30560.

9. Soni, K., & Kumar, S. (2019). Comparison of RBAC and ABAC security models for private cloud

International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon),

Faridabad, India, 2019 (pp. 584–587).

10. Suganthy, A., & Prasanna Venkatesan, V. (2019). An introspective study on dynamic role-centric RBAC

models IEEE International Conference on System, Computation, Automation and Networking (ICSCAN),

Pondicherry, India, 2019 (pp. 1–6).

11. Thakare, A., Lee, E., Kumar, A., Nikam, V. B., & Kim, Y. (April 2020). PARBAC: Priority-attribute-based

RBAC model for Azure IoT cloud. In IEEE Internet of Things Journal, 7(4), 2890–2900.

https://doi.org/10.1109/JIOT.2019.2963794

12. Zou, Y., Deng, J., Xu, C., Liang, X., & Chen, X. (2019). Semantic rule based RBAC extension model for

flexible resource allocation 12th International Symposium on Computational Intelligence and Design (ISCID),

Hangzhou, China, 2019 (pp. 221–224)


Cite this Article as :
Style #
MLA Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria. "Smart City's Security Model for Management of Image Data on Cloud." Journal of Cognitive Human-Computer Interaction, Vol. 2, No. 1, 2022 ,PP. 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)
APA Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria. (2022). Smart City's Security Model for Management of Image Data on Cloud. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 1 ), 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)
Chicago Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria. "Smart City's Security Model for Management of Image Data on Cloud." Journal of Journal of Cognitive Human-Computer Interaction, 2 no. 1 (2022): 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)
Harvard Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria. (2022). Smart City's Security Model for Management of Image Data on Cloud. Journal of Journal of Cognitive Human-Computer Interaction, 2 ( 1 ), 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)
Vancouver Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria. Smart City's Security Model for Management of Image Data on Cloud. Journal of Journal of Cognitive Human-Computer Interaction, (2022); 2 ( 1 ): 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)
IEEE Pooja, Dr. Manish Kumar Mukhija, Satish Kumar Alaria, Smart City's Security Model for Management of Image Data on Cloud, Journal of Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 1 , (2022) : 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)