A Survey on Access Control in Cloud Computing

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-2
Year of Publication : 2018
Authors : Yogita Borse, Anushka Chawathe
DOI :  10.14445/22312803/IJCTT-V59P113


Yogita Borse, Anushka Chawathe "A Survey on Access Control in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V59(2):81-84, May 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Cloud Computing is one of the most widely attributed technology. As cloud providers and clients increased in the market, the amount of data also increased. To have a generalised mechanism for accessing this data while making sure there is enough security maintained is the major concern of the service provider. For the purpose of providing services on cloud, there is an access control mechanism. The services made available by the cloud provider are accessed using this mechanism. In this paper, detailed comparison of the access control mechanisms have been discussed.

[1] Ray I., Ray I. (2014) Trust-Based Access Control for Secure Cloud Computing. In: Han K., Choi BY., Song S. (eds) High Performance Cloud Auditing and Applications. Springer, New York, NY.
[2] Charanya, R., Aramudhan, M.: Survey on access control issues in cloud computing. In: IEEE International Conference on Emerging Trends in Engineering, Technology and Science, pp. 1–4. IEEE (2016)
[3] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, "Comparison-based encryption for fine-grained access control in clouds," in CODASPY, ACM, 2012
[4] Y. Zhu, H. Hu, G. J. Ahn, D. Huang and S. Wang, "Towards temporal access control in cloud computing," 2012 Proceedings IEEE INFOCOM, Orlando, FL, 2012, pp.2576-2580.
[5] R. Aluvalu and L. Muddana, "A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing," 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, 2016, pp. 1-5.
[6] W. Li, W. Ni, D. Liu, R. P. Liu, P. Wang and S. Luo, "Fine-Grained Access Control for Personal Health Records in Cloud Computing," 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, 2017, pp. 1-5.
[7] H. Xia, "Design and implementation of trust — based access control system for cloud computing," 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, 2017, pp. 922-926.
[8] M. Ed-Daibouni, A. Lebbat, S. Tallal and H. Medromi, "A formal specification approach of Privacy-aware Attribute Based Access Control (Pa-ABAC) model for cloud computing," 2016 Third International Conference on Systems of Collaboration (SysCo), Casablanca, 2016, pp. 1-5.
[9] J. Ning, Z. Cao, X. Dong, K. Liang, H. Ma and L. Wei, "Auditable $sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 94-105, Jan. 2018.

Access control, cloud computing, access control mechanisms, cloud data security.