International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 59 | Number 1 | Year 2018 | Article Id. IJCTT-V59P113 | DOI : https://doi.org/10.14445/22312803/IJCTT-V59P113

A Survey on Access Control in Cloud Computing


Yogita Borse, Anushka Chawathe

Citation :

Yogita Borse, Anushka Chawathe, "A Survey on Access Control in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 59, no. 1, pp. 81-84, 2018. Crossref, https://doi.org/10.14445/22312803/IJCTT-V59P113

Abstract

Cloud Computing is one of the most widely attributed technology. As cloud providers and clients increased in the market, the amount of data also increased. To have a generalised mechanism for accessing this data while making sure there is enough security maintained is the major concern of the service provider. For the purpose of providing services on cloud, there is an access control mechanism. The services made available by the cloud provider are accessed using this mechanism. In this paper, detailed comparison of the access control mechanisms have been discussed.


Keywords

Access control, cloud computing, access control mechanisms, cloud data security.

References

[1] Ray I., Ray I. (2014) Trust-Based Access Control for Secure Cloud Computing. In: Han K., Choi BY., Song S. (eds) High Performance Cloud Auditing and Applications. Springer, New York, NY.
[2] Charanya, R., Aramudhan, M.: Survey on access control issues in cloud computing. In: IEEE International Conference on Emerging Trends in Engineering, Technology and Science, pp. 1–4. IEEE (2016)
[3] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, "Comparison-based encryption for fine-grained access control in clouds," in CODASPY, ACM, 2012
[4] Y. Zhu, H. Hu, G. J. Ahn, D. Huang and S. Wang, "Towards temporal access control in cloud computing," 2012 Proceedings IEEE INFOCOM, Orlando, FL, 2012, pp.2576-2580.
[5] R. Aluvalu and L. Muddana, "A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing," 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, 2016, pp. 1-5.
[6] W. Li, W. Ni, D. Liu, R. P. Liu, P. Wang and S. Luo, "Fine-Grained Access Control for Personal Health Records in Cloud Computing," 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, 2017, pp. 1-5.
[7] H. Xia, "Design and implementation of trust — based access control system for cloud computing," 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, 2017, pp. 922-926.
[8] M. Ed-Daibouni, A. Lebbat, S. Tallal and H. Medromi, "A formal specification approach of Privacy-aware Attribute Based Access Control (Pa-ABAC) model for cloud computing," 2016 Third International Conference on Systems of Collaboration (SysCo), Casablanca, 2016, pp. 1-5.
[9] J. Ning, Z. Cao, X. Dong, K. Liang, H. Ma and L. Wei, "Auditable $sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 94-105, Jan. 2018.