Secure Data Sharing and Access Control in Cloud-Based Database Systems

Authors

  • Nisrina Haliim Information Security Analyst, Indonesia Author
  • Clarissa Ramadhan Independent Researcher, Iraq Author

Keywords:

Cloud security, Data sharing, Access control, Cloud databases, Encryption, Privacy preservation, Attribute-based access, Role-based models, Data confidentiality

Abstract

With the rapid migration of data storage and management to cloud infrastructures, ensuring secure data sharing and robust access control mechanisms has become a critical challenge. This paper reviews foundational methods and strategies for data protection in cloud-based database systems, evaluating key technologies such as encryption, attribute-based access control, and identity management. It proposes a layered security model that integrates these approaches to enhance protection and compliance. Through charts, tables, and data analysis, the study highlights performance impacts, common threat models, and best practices. The findings underscore the importance of balancing usability, scalability, and security in evolving cloud ecosystems.

References

Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM 2010.

Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS.

Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE T. Parallel Distrib. Syst., 24(1), 131–143.

Sirimalla A. Autonomous Performance Tuning Framework for Databases Using Python and Machine Learning. J Artif Intell Mach Learn & Data Sci 2023 1(4), 3139-3147. DOI: doi.org/10.51219/JAIMLD/adithya-sirimalla/642

Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE T. Services Computing, 5(2), 220–232.

Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. EUROCRYPT, 457–473.

Wang, H., Yan, Z., & Zhang, P. (2015). Privacy-preserving data sharing in cloud computing. J. Supercomput., 71, 4413–4435.

Sirimalla, A. (2022). End-to-end automation for cross-database DevOps deployments: CI/CD pipelines, schema drift detection, and performance regression testing in the cloud. World Journal of Advanced Research and Reviews, 14(3), 871–889. https://doi.org/10.30574/wjarr.2022.14.3.0555

Li, J., Chen, X., Li, M., Lee, P. P. C., & Lou, W. (2013). Secure deduplication with efficient and reliable convergent key management. IEEE T. Parallel Distrib. Syst., 25(6), 1615–1625.

Zhou, J., Cao, Z., Dong, X., & Lin, X. (2013). Secure and efficient data transmission for cluster-based wireless sensor networks. Int. J. Netw. Secur., 14(3), 182–188.

Liu, F., Tong, J., Mao, J., Bohn, R. B., & Messina, J. (2011). NIST cloud computing reference architecture. NIST Special Publication, 500(292), 1–28.

Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl., 34(1), 1–11.

Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Comput., 16(1), 69–73.

Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing. CloudCom 2009, 157–166.

Downloads

Published

2024-10-15

How to Cite

Nisrina Haliim, & Clarissa Ramadhan. (2024). Secure Data Sharing and Access Control in Cloud-Based Database Systems. International Journal of Information Technology and Electrical Engineering (IJITEE), 13(5), 28-34. https://ijitee.com/index.php/home/article/view/IJITEE_1305004