Comparative Analysis of Access Control Models

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-29 Number-3
Year of Publication : 2015
Authors : Usvir Kaur, Dheerendra Singh
  10.14445/22312803/IJCTT-V29P123

MLA

Usvir Kaur, Dheerendra Singh "Comparative Analysis of Access Control Models". International Journal of Computer Trends and Technology (IJCTT) V29(3):132-135, November 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is becoming most promising paradigm in information technology industry. Due to dynamic relationship between users and resources, service providers and users. Security has became one of the main hurdle in the growth of cloud computing. Access Control model can achieve security by controlling access to resources by users. Different access control models have different methods to achieve security. In this paper comparative analysis of different access control models are done.

References
[1] A. R. Khan, “ Access Control In Cloud Computing Environment”,ARPN Journal of Engineering and Applied Sciences, Vol. 7, No. 5,pp. 613-615,MAY 2012.
[2] L.Zhou, V. Varadharajan, M. Hitchens, “Achieving Secure Role- Based Access Controlon Encrypted Data in Cloud Storage” IEEE Transactions On Information Forensics And Security, Vol. 8, No. 12, pp.1947-1960, DEC. 2013
[3] B. S.Vidyalakshmi, K. W. Raymond, Chi-Hung Chi, “Decentralized Trust Driven Access Control for Mobile Content Sharing”, IEEE International Congress on Big Data,pp.239-246,2013.
[4] S. Yu, C. Wang, K.Ren, W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, IEEE INFOCOM 2010.
[5] Y.A. Younis, K. Kifayat, M.Merabti, “An access control model for cloud computing” journal of information security and applications, Vol. 19,pp. 45 -60,2014.
[6] N. Meghanathan, “Review Of Access Control Models For Cloud Computing”, Computer Science & Information Technology (CS & IT), ICCSEA, pp. 7–85, 2013.
[7] K. Hasebe, M. Mabuchi, A. Matsushita,”Capability-Based Delegation Model in RBAC”.
[8] R.A. Crues, “Methods for Access Control: Advances and Limitations”.
[9] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Scalable secure file sharing on untrusted storage,” in Proc. of FAST’03,2003.
[10] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proc. of NDSS’03, 2003 [11] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010
[12] L. Zhou, V. Varadharajan, and M. Hitchens, “Enforcing rolebased access control for secure data storage in the cloud,” Comput. J., vol. 54, no. 13, pp. 1675–1687, Oct. 2011.
[13] Y. Zhu, H. Hu, G.-J. Ahn, H. Wang,and S.-B. Wang, “Provably secure role-based encryption with revocation mechanism,” J. Comput. Sci.Technol., vol. 26, no. 4, pp. 697–710, 2011.
[14] D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in EUROCRYPT , vol. 3494. New York, NY, USA: Springer- Verlag, pp. 440–456, May 2005.
[15] D. F. Ferraiolo, J. F. Barkley, D. R. Kuhn, “A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet”, ACM Transactions on Information and System Security, Vol. 2, No. 1, pp.34–64, Feb1999.
[16] P. Mell, T. Grance, “The NIST Definition of Cloud Computing”, Recommendations of the National Institute of Standards and Technology.

Keywords
Access control model, security, trust.