Abstract
With the rapid advancement of emerging technologies, a huge amount of data is created and processed in daily life. Nowadays, Cloud Computing (CC) technology is one of the frequently adopted technologies to access and store data over the internet. CC mainly provides on-demand and pay-per-use services to users. However, access control and security are two major issues that users face in a cloud environment. During data access from a cloud server, the searching time of a Data Owner (DO) and the data accessing time are high. Therefore, users utilize more cloud services and pay more. High system overhead is another issue of a cloud environment. In this paper, a novel access control model has been proposed to overcome all these concerns. Here, the Cloud Service Provider (CSP) maintains a temporary table based on the data type and popularity value of the DO for fast and efficient data accessing. The cloud service provider can easily search the data owner by using the table and the data accessing time is remarkably reduced. Experimental results and theoretical analysis of the proposed scheme prove its efficiency over the existing schemes.




Similar content being viewed by others
References
Huth A, Chebula J (2011) The basics of cloud computing,. Carnegie Mellon University
Namasudra S, Nath S, Majumder A (2014) Profile based access control model in cloud computing environment. In: Proceedings of the International Conference on Green Computing, Communication and Electrical Engineering, IEEE, Coimbatore, India, pp. 1–5
Li S, Wang G, Yang J (2019) Survey on cloud model based similarity measure of uncertain concepts. CAAI Transactions on Intelligence Technology 4(4):223–230
Namasudra S, Roy P (2017) A new table based protocol for data accessing in cloud computing. J Inf Sci Eng 33(3):585–609
Gao X, Jiang Z, Jiang R. A novel data access scheme in cloud computing. In Proceedings of the 2nd International Conference on Computer and Information Applications, 2012, pp. 124–127
Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise. https://doi.org/10.1002/cpe.4364
Sarkar M, Saha K, Namasudra S, Roy P (2015) An efficient and time saving web service based android application. SSRG Int J Comp Sci Eng 2(8):18–21
Namasudra S, Roy P, Balamurugan B (2017) Cloud computing: fundamentals and research issues. In: Proceedings of the 2nd International Conference on Recent Trends and Challenges in Computational Models, IEEE, Tindivanam, India
Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2020) The revolution of blockchain: state-of-the-art and research challenges. Archives of Computational Methods in Engineering. https://doi.org/10.1007/s11831-020-09426-0
Namasudra S (2018) Taxonomy of DNA-based security models. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis, pp. 53–68
Namasudra S, Roy P, Balamurugan B, Vijayakumar P (2017) Data accessing based on the popularity value for cloud computing. In Proceedings of the International Conference on Innovations in Information, Embedded and Communications Systems (ICIIECS), IEEE, Coimbatore, India
Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intelligence Tech 5(1):9–14
Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105
Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547
Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. International Journal of Applied Research in Bioinformatics (IJARB) (in press)
Namasudra S, Deka GC (2018) Advances of DNA computing in cryptography. Taylor & Francis
Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 153–166
Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Transactions on Multimedia Computing, Communications, and Application (in press)
Namasudra S, Deka GC (2018) Introduction of DNA computing in cryptography. In Advances of DNA Computing in Cryptography, S. Namasudra and G. C. Deka, Eds., Taylor & Francis, pp. 27–34
Namasudra S, Roy P (2018) PpBAC: popularity based access control model for cloud computing. Journal of Organizational and End User Computing 30(4):14–31
Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Transactions on Intelligence Technology 4(3):159–174
Namasudra S, Deka GC, Bali R (2018) Applications and future trends of DNA computing. In: Namasudra S, Deka GC (Eds) Advances of DNA Computing in Cryptography. Taylor & Francis
Devi D, Namasudra S, Kadry S (2020) A boosting-aided adaptive cluster-based undersampling approach for treatment of class imbalance problem. Int J Data Warehouse Min 16(3). https://doi.org/10.4018/IJDWM.2020070104
Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11(10)
Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In Proceedings of the 15th National Computer Security Conference, Baltimore, USA, pp. 554–563
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, USA, pp. 89–98
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, pp. 1–9
Ajgaonkar S, Indalkar H, Jeswani J (2015) Activity based access control model for cloud computing. Int J Curr Eng Techn 5(2):708–713
Raghavendra S, Meghana K, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comp Sci 89:293–300
Murugan A, Thilagavathy R (2018) Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In Proceedings of the IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017), IEEE, pp. 2263–2268
Almutairi A, Sarfraz MI, Ghafoo A (2018) Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Trans Cloud Computing 6(1):168–181
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Sec 7(2):743–754
Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust based access control model in cloud computing. China Comm 11(4):154–162
Alam Q, Malik SUR, Akhunzada A, Choo KKR, Tabbasum S, Alam M (2017) A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans Inf Forensics Sec 12(6):1259–1268
Xie Y, Wen H, Wu B, Jiang Y, Meng J (2019) A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Trans Cloud Computing 7(2):383–391
Namasudra S (2018) Cloud computing: a new era. J Fund Appl Sci 10(2):113–135
Calheiros RN, Ranjan R, Beloglazov A (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software-Pract Exp (SPE) 41(1):23–50
(2020) Apache commons math. Available: http://commons.apache.org/proper/commons-math/download_math.cgi. Accessed on 13 Jan 2020
(2020) Java. Available: http://java.com/en/download/index.jsp. Accessed on 13 Jan 2020
(2020) CityPulse dataset collection. Available: http://iot.ee.surrey.ac.uk:8080/datasets.html. Accessed 13 Jan 2020
Tripura J, Roy P (2017) Flow forecasting in multiple sections of a river system. KSCE J Civ Eng 21(2):512–522
Tripura J, Roy P, Barbhuiya AK (2018) Application of RBFNNs incorporating MIMO processes for simultaneous river flow forecasting. J Eng Technol 50(3):434–449
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications
Guest Editor: Ching-Hsien Hsu
Rights and permissions
About this article
Cite this article
Namasudra, S., Chakraborty, R., Kadry, S. et al. FAST: Fast Accessing Scheme for data Transmission in cloud computing. Peer-to-Peer Netw. Appl. 14, 2430–2442 (2021). https://doi.org/10.1007/s12083-020-00959-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00959-6