Review of Role Based Access Control Method for Securing User Space in Cloud Computing
Mrs.Sunitha B.S , Dr.Anir Ban Basu."Review of Role Based Access Control Method for Securing User Space in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V14(1):22-25, Aug 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Cloud computing is a disrtibuted system which supports various types of services like SAAS, IAAS and PASS. The data resides with in the cloud is vital, hence there is a need to preserve the data as well as to maintain the privacy of cloud users. In conventional access control mechanisms, on granting the access right , the data will be completely available at the service provider. In order to monitor the actual usage of the data, logging and auditing technique called role based access control is used. Role Based Controls Access provides a method to reduce the overhead of the server by avoiding users from accessing the data out of their boundary. This paper discusses various features of role based access control mechanism, required for securing data storage in cloud computing environment.
References
[1] Reeja S L, RBAC in CLOUD COMPUTING USING CSAR ”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 10, October 2012.
[2] R. S. Sandhu, Role-Based access control models," IEEE Computer, 29(2):38-47, 1996.
[3] Yan Zhuongxin Huy, Gail-Joon Ahny, Dijiang Huangy, and Shanbiao Wang, Towards Temporal Access Control in Cloud Computing, IEEE 2010.
[4] A. Corradi, R. ,Annual International Computer Software and Applications Conference (COMPSAC’04), Hong Kong, China, pages 444–451, IEEE, September 2004.
[5] K. Fukushima, S. Kiyomoto, and Y. Miyake, ?Towards secure cloud computing architecture - asolution based on software protection mechanism, 2011.
[6] D.F. Ferraiolo, D. R. Kuhn, and R. Chandramouli,?Role-Based Access Control, Artech House, 2003.
[7] W. Han, J. Zhang, and X. Yao,Context-sensitive access control model and implementation, In Proc. of the 5th International Conference on Computer and Information Technology (CIT’05), Shanghai, China, pages 757–763. IEEE, September 2005.
[8] R Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2), February 1996
[9] Mamoon Rashid and Rishma Chawla. Article: Securing Data Storage by Extending Role based Access Control. International Journal of Computer Applications 90(18):28-34, March 2014. Published by Foundation of Computer Science, New York, USA.
[10] S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, “A novel ultrathin elevated channel low-temperature poly-Si TFT,” IEEE Electron Device Lett., vol. 20, pp. 569–571, Nov. 1999.
[11] Lili Sun, Hua Wang, How to use attribute-based encryption to implement role-based access control in the cloud Proceedings of the 2013 international workshop on Security in cloud computing, 2013
[12] Marko Komlenovic, Mahesh Tripunitara, Toutik Zitouni ?An Empirical Assessment of Approaches to Distributed Enforcement in Role - Based Access Control ? Proc .of ACM conference on Data & Application Security & Privacy , 2011
[13] Parminder Singh, Sarpreet Singh A New Advance Efficient RBAC to Enhance the Security in Cloud Computing, June 2013
[14] Qiang Wei, Konstantin Beznosow,?Authorization Recycling in Hierarchical Role Based Access Control Systems ACM Transactions on Information and System Security (TISSEC), Volume 14 Issue 1, May 2011
[15] Abdul Raouf Khan, ?ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT”, ARPN Journal of Engineering and Applied VOL. 7, NO. 5, MAY 2012.
Keywords
Cloud Server, RBAC, User Limitation