CFP last date
16 December 2024
Reseach Article

Analysis of Different Access Control Mechanism in Cloud

by Punithasurya K, Jeba Priya S
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 2
Year of Publication: 2012
Authors: Punithasurya K, Jeba Priya S
10.5120/ijais12-450660

Punithasurya K, Jeba Priya S . Analysis of Different Access Control Mechanism in Cloud. International Journal of Applied Information Systems. 4, 2 ( September 2012), 34-39. DOI=10.5120/ijais12-450660

@article{ 10.5120/ijais12-450660,
author = { Punithasurya K, Jeba Priya S },
title = { Analysis of Different Access Control Mechanism in Cloud },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2012 },
volume = { 4 },
number = { 2 },
month = { September },
year = { 2012 },
issn = { 2249-0868 },
pages = { 34-39 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number2/274-0660/ },
doi = { 10.5120/ijais12-450660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:46:58.699833+05:30
%A Punithasurya K
%A Jeba Priya S
%T Analysis of Different Access Control Mechanism in Cloud
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 2
%P 34-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper deals with various access control mechanisms that are present in cloud computing. Cloud computing is the emerging technology where resources are available pay as you go basis. Cloud storage technology provides the large pool of storage capacity to the cloud users. Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users. Access control gives the authorization to the users which gives the access privileges on data and other resources. Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway. We present various types of access control mechanisms that are used in cloud computing environment.

References
  1. Ravi S. Sandhu and Pierangela Samarati "Access Control: Principles and Practice" IEEE Communications Magazine, September 1994.
  2. Yingjie Xia, Li Kuang and Mingzhe Zhu "A Hierarchical Access Control Scheme in Cloud using HHECC" Information Technology Journal 9 (8): 1598-1606 , 2010
  3. Hazen A. Weber "Role Based Access Control: The NIST solution" San Institute of Info Reading Room, October 3 ,2008.
  4. Joon S. Park, Gail-Joon Ahn, Ravi Sandhu "Role-based Access control on the web using LDAP"
  5. Abdul Raouf Khan " Access control in cloud computing Environment" ARPN Journal of Engineering and Applied Science,vol 7, No. 5 May 2012.
  6. Zhu Tiayni, Liu Weidong, Song jiaxing "An Efficient role based access control system for cloud computing" 2011 11th IEEE International Conference on Computer and Information Technology.
  7. Xiaohui Li, Jingsha he, Ting Zhang "Negative Authorization in Access Control for Cloud Computing" International Journal of security and its Applications. Vol. 6, No. 2 April 2012.
  8. Armbrust, M. , A. Fox, R. Griffith, A. D. Joseph and R. Katz et al,2010. "A view of cloud computing Commun. ACM. , 53: 50-58
  9. Vouk, M. A. , 2008 Cloud computing-issues, research and implementations. J. Comput. Inform Technol. ,4: 235-246
  10. Tolone, W. G, Ahn, T. Pai and S Hong, 2005 "Access control in collaborative systems", ACM Comput. Surv. ,37: 29-41.
  11. Zhiugo wan, Jun'e Liu, Robert H. Deng, "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing" IEEE Transaction on Information Forensics and security, April 2012.
  12. Ramadan Abdunabi, " Extensions to the Role Based Access Control Model for Newer Computing paradigms", Oct 26,2010
  13. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shanbiao Wang, "Towards Temporal Access Control in Cloud Computing",
  14. Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia, "A Role and Attribute based Access Control System using Semantic Web Technologie".
  15. Mariana Raykova, Hang Zhao, Steven M. Bellovin, "Privacy Enhanced Access Control for Outsourced Data Sharing".
  16. V. Sathya Preiya, R. Pavithra, Dr. Joshi, "Secure Role Based Data Access Control in Cloud Computing" International Journal of Computer Trends and Technology, may 2011.
  17. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, " Achieving Secure, Scalable and Fine-Grained Data Access Control in Cloud Computing"
  18. Amanda Crowell, University of Maryland. " A Survey of Access Control Policies".
  19. Yongdong Wu, Vivy Suhendra, Huaqun Guo, "A Gateway- Based Access Control Scheme for Collaborative Clouds" Institute for InfoComm Research.
  20. Sushmita Ruj, Amiya Nayak, Ivon Stojmenovic, "DACC: Distributed Access Control in clouds" 2011 International Joint Conference of IEEE TrustCom-11/IEEE-ICESS-11/FCST-11.
Index Terms

Computer Science
Information Sciences

Keywords

Discretionary access control Mandatory access control Role Based Access control Conventional RBAC dRBAC Cloud Optimized RBAC