Multi-layer access control for cloud data using improved DBSCAN, AES, homomorphic encryption, and RMAAC for text, image, and video

Authors

  • A. Jeneba Mary Research Scholar, Department of Computational Logistics , Alagappa University, Karaikudi, India.
  • K. Kuppusamy Department of Computational Logistics , Alagappa University, Karaikudi, India.
  • A. Senthilrajan Department of Computational Logistics, Alagappa University, Karaikudi.

DOI:

https://doi.org/10.22399/ijcesen.837

Keywords:

DBSCAN, CLOUD, RMAAC, AES, Security, homomorphic encryption

Abstract

With the growing demand for cloud storage solutions that can handle diverse data types such as text, images, and videos, ensuring robust access control and security becomes important. This paper proposes a novel multi-layer access control framework for cloud environments, incorporating advanced Clustering Filtering Techniques with an Improved DBSCAN (Density-Based Spatial Clustering of Applications with Noise) algorithm to enhance search efficiency across multiple data layers. This clustering approach enables quick and accurate retrieval of text, image, and video content by efficiently organizing data based on similarity. To ensure data privacy and security, employs a hybrid encryption approach, combining Advanced Encryption Standard (AES) for data at rest and Homomorphic Encryption (HE) for data in use, allowing secure data manipulation without compromising confidentiality. The access control mechanism is further strengthened by introducing a Role-based Multi-Attribute Access Control (RMAAC) model, which grants permissions based on a user’s role, attributes, and the sensitivity level of the data being accessed. This fine-grained control restricts unauthorized access while supporting flexible policies for different data types. Simulation results demonstrate that the proposed framework significantly improves data retrieval speed, security, and clustering performance, making it an effective solution for cloud storage systems handling diverse media formats.

References

Mostafa, A.M., Ezz, M., Elbashir, M.K., Alruily, M., Hamouda, E., Alsarhani, M. and Said, W., (2023). Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication. Applied Sciences, 13(19),10871. https://doi.org/10.3390/app131910871

Awadh, W.A., Alasady, A.S. and Hashim, M.S., (2023). A multilayer model to enhance data security in cloud computing. Indonesian Journal of Electrical Engineering and Computer Science, 32(2),1105-1114.

Gupta, M., Bhatt, S., Alshehri, A.H. and Sandhu, R., (2022). Access control models and architectures for IoT and cyber physical systems (pp. 1-173). Cham, Switzerland: Springer.

Adee, R. and Mouratidis, H., (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, 22(3),1109. https://doi.org/10.3390/s22031109

Alemami, Y., Al-Ghonmein, A.M., Al-Moghrabi, K.G. and Mohamed, M.A., (2023). Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer Engineering, 13(2),1867. http://doi.org/10.11591/ijece.v13i2.pp1867-1879

Chaudhry, S.A., Yahya, K., Al-Turjman, F. and Yang, M.H., (2020). A secure and reliable device access control scheme for IoT based sensor cloud systems. IEEE Access, 8,139244-139254. doi: 10.1109/ACCESS.2020.3012121

Yang, C., Tan, L., Shi, N., Xu, B., Cao, Y. and Yu, K., (2020). AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud. IEEE Access, 8,70604-70615. doi: 10.1109/ACCESS.2020.2985762

Qin, X., Huang, Y., Yang, Z. and Li, X., (2021). A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. Journal of Systems Architecture, 112,101854. https://doi.org/10.1016/j.sysarc.2020.101854

Qi, S., Lu, Y., Wei, W. and Chen, X., (2020). Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet of Things Journal, 8(4), pp.2886-2899.

Egala, B.S., Pradhan, A.K., Badarla, V. and Mohanty, S.P., (2021). Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet of Things Journal, 8(14),11717-11731.

Han, D., Zhu, Y., Li, D., Liang, W., Souri, A. and Li, K.C., (2021). A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Transactions on Industrial Informatics, 18(5),3530-3540.

Mangalagowri, R. and Venkataraman, R., (2023). Ensure secured data transmission during virtual machine migration over cloud computing environment. International Journal of System Assurance Engineering and Management, pp.1-12. DOI:10.1007/s13198-022-01834-8

Susilabai, S.S., Mahendran, D.S. and Peter, S.J., (2022). A trusted user integrity-based privilege access control (UIPAC) for secured clouds. In Ubiquitous Intelligent Systems: Proceedings of ICUIS 2021 (pp. 499-520). Springer Singapore.

Fugkeaw, S., (2020). A fine-grained and lightweight data access control model for mobile cloud computing. IEEE Access, 9,836-848. doi: 10.1109/ACCESS.2020.3046869

Xu, G., Xu, S., Ma, J., Ning, J. and Huang, X., (2023). An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud. IEEE Transactions on Information Forensics and Security. 18, 5171-5185. DOI:10.1109/TIFS.2023.3305870

Anju, J. and Shreelekshmi, R., (2022). A faster secure content-based image retrieval using clustering for cloud. Expert Systems with Applications, 189,116070. https://doi.org/10.1016/j.eswa.2021.116070

Ramachandra, M.N., Srinivasa Rao, M., Lai, W.C., Parameshachari, B.D., Ananda Babu, J. and Hemalatha, K.L., (2022). An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data and Cognitive Computing, 6(4),101. https://doi.org/10.3390/bdcc6040101

Rafique, A., Van Landuyt, D., Beni, E.H., Lagaisse, B. and Joosen, W., (2021). CryptDICE: Distributed data protection system for secure cloud data storage and computation. Information Systems, 96,101671. https://doi.org/10.1016/j.is.2020.101671

Huang, Z., Zhang, M. and Zhang, Y., (2019). Toward efficient encrypted image retrieval in cloud environment. IEEE Access, 7,174541-174550. doi: 10.1109/ACCESS.2019.2957497

Xu, Y., Zhao, X. and Gong, J., (2019). A large-scale secure image retrieval method in cloud environment. IEEE Access, 7,160082-160090. doi: 10.1109/ACCESS.2019.2951175

Li, J.S., Liu, I.H., Tsai, C.J., Su, Z.Y., Li, C.F. and Liu, C.G., (2020). Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access, 8, 114940-114952.

Chai, X., Wang, Y., Gan, Z., Chen, X. and Zhang, Y., (2022). Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Information Sciences, 604,115-141. https://doi.org/10.1016/j.ins.2022.05.008

Shen, M., Cheng, G., Zhu, L., Du, X. and Hu, J., (2020). Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Generation Computer Systems, 109,621-632.

Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J. and Shi, Y.Q., (2017). A privacy-preserving content-based image retrieval method in cloud environment. Journal of Visual Communication and Image Representation, 43,164-172.

Xia, Z., Wang, L., Tang, J., Xiong, N.N. and Weng, J., (2020). A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Transactions on Network Science and Engineering, 8(1),318-330. DOI:10.1109/TNSE.2020.3038218

Dataset taken for image and video from: “https://www.kaggle.com/competitions/mu-cifar10”, dated 1/11/2024.

Dataset taken for text from: “https://scikit-learn.org/dev/modules/generated/sklearn.datasets.fetch_20newsgroups.html”, dated 1/11/2024.

Downloads

Published

2025-01-08

How to Cite

A. Jeneba Mary, K. Kuppusamy, & A. Senthilrajan. (2025). Multi-layer access control for cloud data using improved DBSCAN, AES, homomorphic encryption, and RMAAC for text, image, and video. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.837

Issue

Section

Research Article