SECURE MODEL OF ACCESS CONTROL FOR CLOUD COMPUTING USING KEY GENERATION BASED PUBLIC CYCLIC KEY GENERATION METHOD



Authors

  • Ranjeet Osari1, Rahul Singhai2

DOI:

https://doi.org/10.15282/jmes.17.1.2023.10.0744


Keywords:

Cloud Computing, Access Control, Authentication, RSA, Public Key, RMI


Abstract

Cloud computing is a big platform of service-oriented applications over the internet. The primary access control of cloud services using login credentials for users. The growing rate of malicious software breaks the security credentials of users and theft data, and blocks the services. To prevent security threats, cloud service providers and NIST design various access control using cryptography algorithms. However, the role-based access control mechanism has limitations and breaks the security bridge between users and service providers. This paper proposed key generation-based access control methods for accessing services and data over cloud computing. The proposed key generation approach is a public key generation algorithm, a cyclic key generation algorithm. The proposed key generation methods are implemented in the Java RMI model and MYSQL database. The proposed algorithm compares with RSA based key authentication approach. The experimental results suggest that the proposed algorithm is better than the existing algorithm of access control of cloud computing.



Published

2023-08-30

How to Cite