Secure Data Sharing and Access Control in Cloud-Based Database Systems
Keywords:
Cloud security, Data sharing, Access control, Cloud databases, Encryption, Privacy preservation, Attribute-based access, Role-based models, Data confidentialityAbstract
With the rapid migration of data storage and management to cloud infrastructures, ensuring secure data sharing and robust access control mechanisms has become a critical challenge. This paper reviews foundational methods and strategies for data protection in cloud-based database systems, evaluating key technologies such as encryption, attribute-based access control, and identity management. It proposes a layered security model that integrates these approaches to enhance protection and compliance. Through charts, tables, and data analysis, the study highlights performance impacts, common threat models, and best practices. The findings underscore the importance of balancing usability, scalability, and security in evolving cloud ecosystems.
References
Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM 2010.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE T. Parallel Distrib. Syst., 24(1), 131–143.
Sirimalla A. Autonomous Performance Tuning Framework for Databases Using Python and Machine Learning. J Artif Intell Mach Learn & Data Sci 2023 1(4), 3139-3147. DOI: doi.org/10.51219/JAIMLD/adithya-sirimalla/642
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE T. Services Computing, 5(2), 220–232.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. EUROCRYPT, 457–473.
Wang, H., Yan, Z., & Zhang, P. (2015). Privacy-preserving data sharing in cloud computing. J. Supercomput., 71, 4413–4435.
Sirimalla, A. (2022). End-to-end automation for cross-database DevOps deployments: CI/CD pipelines, schema drift detection, and performance regression testing in the cloud. World Journal of Advanced Research and Reviews, 14(3), 871–889. https://doi.org/10.30574/wjarr.2022.14.3.0555
Li, J., Chen, X., Li, M., Lee, P. P. C., & Lou, W. (2013). Secure deduplication with efficient and reliable convergent key management. IEEE T. Parallel Distrib. Syst., 25(6), 1615–1625.
Zhou, J., Cao, Z., Dong, X., & Lin, X. (2013). Secure and efficient data transmission for cluster-based wireless sensor networks. Int. J. Netw. Secur., 14(3), 182–188.
Liu, F., Tong, J., Mao, J., Bohn, R. B., & Messina, J. (2011). NIST cloud computing reference architecture. NIST Special Publication, 500(292), 1–28.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl., 34(1), 1–11.
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Comput., 16(1), 69–73.
Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing. CloudCom 2009, 157–166.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Nisrina Haliim, Clarissa Ramadhan (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
