Skip to main content

Advertisement

Log in

FAST: Fast Accessing Scheme for data Transmission in cloud computing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid advancement of emerging technologies, a huge amount of data is created and processed in daily life. Nowadays, Cloud Computing (CC) technology is one of the frequently adopted technologies to access and store data over the internet. CC mainly provides on-demand and pay-per-use services to users. However, access control and security are two major issues that users face in a cloud environment. During data access from a cloud server, the searching time of a Data Owner (DO) and the data accessing time are high. Therefore, users utilize more cloud services and pay more. High system overhead is another issue of a cloud environment. In this paper, a novel access control model has been proposed to overcome all these concerns. Here, the Cloud Service Provider (CSP) maintains a temporary table based on the data type and popularity value of the DO for fast and efficient data accessing. The cloud service provider can easily search the data owner by using the table and the data accessing time is remarkably reduced. Experimental results and theoretical analysis of the proposed scheme prove its efficiency over the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Huth A, Chebula J (2011) The basics of cloud computing,. Carnegie Mellon University

  2. Namasudra S, Nath S, Majumder A (2014) Profile based access control model in cloud computing environment. In: Proceedings of the International Conference on Green Computing, Communication and Electrical Engineering, IEEE, Coimbatore, India, pp. 1–5

  3. Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4(4):223–230

    Article  Google Scholar 

  4. Namasudra S, Roy P (2017) A new table based protocol for data accessing in cloud computing. J Inf Sci Eng 33(3):585–609

    MathSciNet  Google Scholar 

  5. Gao X, Jiang Z, Jiang R. A novel data access scheme in cloud computing. In Proceedings of the 2nd International Conference on Computer and Information Applications, 2012, pp. 124–127

  6. Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise. https://doi.org/10.1002/cpe.4364

  7. Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comp Sci Eng 2(8):18–21

    Google Scholar 

  8. Namasudra S, Roy P, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models, IEEE, Tindivanam, India

  9. Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2020) The revolution of blockchain: state-of-the-art and research challenges. Archives of Computational Methods in Engineering. https://doi.org/10.1007/s11831-020-09426-0

  10. Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis, pp. 53–68

  11. Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded and Communications Systems (ICIIECS), IEEE, Coimbatore, India

  12. Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intelligence Tech 5(1):9–14

    Article  Google Scholar 

  13. Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105

    Article  Google Scholar 

  14. Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547

    Article  Google Scholar 

  15. Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics (IJARB) (in press)

  16. Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis

  17. Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 153–166

  18. Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Transactions on Multimedia Computing, Communications, and Application (in press)

  19. Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 27–34

  20. Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30(4):14–31

    Article  Google Scholar 

  21. Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4(3):159–174

    Article  Google Scholar 

  22. Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis

  23. Devi D, Namasudra S, Kadry S (2020) A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. Int J Data Warehouse Min 16(3). https://doi.org/10.4018/IJDWM.2020070104

  24. Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10)

  25. Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In Proceedings of the 15th National Computer Security Conference, Baltimore, USA, pp. 554–563

  26. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, USA, pp. 89–98

  27. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, pp. 1–9

  28. Ajgaonkar S, Indalkar H, Jeswani J (2015) Activity based access control model for cloud computing. Int J Curr Eng Techn 5(2):708–713

    Google Scholar 

  29. Raghavendra S, Meghana K, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comp Sci 89:293–300

    Article  Google Scholar 

  30. Murugan A, Thilagavathy R (2018) Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In Proceedings of the IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017), IEEE, pp. 2263–2268

  31. Almutairi A, Sarfraz MI, Ghafoo A (2018) Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Trans Cloud Computing 6(1):168–181

    Article  Google Scholar 

  32. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Sec 7(2):743–754

    Article  Google Scholar 

  33. Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust based access control model in cloud computing. China Comm 11(4):154–162

    Article  Google Scholar 

  34. Alam Q, Malik SUR, Akhunzada A, Choo KKR, Tabbasum S, Alam M (2017) A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans Inf Forensics Sec 12(6):1259–1268

    Article  Google Scholar 

  35. Xie Y, Wen H, Wu B, Jiang Y, Meng J (2019) A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Trans Cloud Computing 7(2):383–391

    Article  Google Scholar 

  36. Namasudra S (2018) Cloud computing: a new era. J Fund Appl Sci 10(2):113–135

    Google Scholar 

  37. Calheiros RN, Ranjan R, Beloglazov A (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software-Pract Exp (SPE) 41(1):23–50

    Article  Google Scholar 

  38. (2020) Apache commons math. Available: http://commons.apache.org/proper/commons-math/download_math.cgi. Accessed on 13 Jan 2020

  39. (2020) Java. Available: http://java.com/en/download/index.jsp. Accessed on 13 Jan 2020

  40. (2020) CityPulse dataset collection. Available: http://iot.ee.surrey.ac.uk:8080/datasets.html. Accessed 13 Jan 2020

  41. Tripura J, Roy P (2017) Flow forecasting in multiple sections of a river system. KSCE J Civ Eng 21(2):512–522

    Article  Google Scholar 

  42. Tripura J, Roy P, Barbhuiya AK (2018) Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting. J Eng Technol 50(3):434–449

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suyel Namasudra.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications

Guest Editor: Ching-Hsien Hsu

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Namasudra, S., Chakraborty, R., Kadry, S. et al. FAST: Fast Accessing Scheme for data Transmission in cloud computing. Peer-to-Peer Netw. Appl. 14, 2430–2442 (2021). https://doi.org/10.1007/s12083-020-00959-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00959-6

Keywords

Navigation