Analysis of Different Access Control Mechanism in Cloud

@article{Punithasurya2012AnalysisOD,
  title={Analysis of Different Access Control Mechanism in Cloud},
  author={K Punithasurya and S. Jebapriya},
  journal={International Journal of Applied Information Systems},
  year={2012},
  volume={4},
  pages={34-39}
}
This paper deals with various access control mechanisms that are present in cloud computing. Cloud computing is the emerging technology where resources are available pay as you go basis. Cloud storage technology provides the large pool of storage capacity to the cloud users. Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users. Access control gives the authorization to the users which gives the… Expand
Different Access Control Mechanisms for Data Security in Cloud Computing
TLDR
It is determined well defined criteria necessary within the context of current cloud computing requirements are determined, and the appropriate model for the cloud environment is chosen. Expand
Evaluation of Access Control Techniques in Cloud Computing
TLDR
Main benefit of use of cloud computing is you don’t worry about the data storage capacity, equipment purchasing and access speed, and even with of this technology data sharing is very easy. Expand
Survey on Access Control Mechanisms in Cloud Computing
TLDR
Seven different access control mechanisms used in cloud computing platforms for different purposes are described and the advantages and disadvantages of various models developed from previous service-based architectures and used for cloud computing are detailed and classified. Expand
Role Based Encryption with Efficient Access Control in Cloud Storage
Cloud computing is a pool of large systems interconnected with each other for scalable data and file storage. With the advantage of this technology cost of computation and storage is reducedExpand
Ensuring Security in Cloud Computing Using Access Control: A Survey
TLDR
A comprehensive taxonomy of different ABAC schemes is provided to select the appropriate access control model that meets cloud constraints and ABAC model is more suitable to cloud environments compared to other models. Expand
Enhancing Cloud Security through Access Control Models: A Survey
TLDR
Various access control models starting from the traditionally DAC, MAC, MAC (Mandatory Access Control), RBAC, RBAC and ABAC to the latest ABE (Attribute Based Encryption) models like CP-ABE, KP-ABe, HABE and HASBE are discussed. Expand
Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication-A Review
Cloud computing is an emerging, on-demand and internetbased technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. The cloud platformsExpand
A New Access Control Scheme for Protecting Distributed Cloud Services and Resources
TLDR
A novel generic access control scheme, capable to work with most of the available access control policies using a global resource management system (GRMS) to effectively handle both local and remote authentication requests is presented. Expand
A Semi-distributed Access Control Management Scheme for Securing Cloud Environment
TLDR
This paper presents a new access control architecture using a global resource management system (GRMS) to effectively handle both local and remote access requests and works effectively with both peered access control module (PACM) and virtual resource manager (VRM) to protect and manage all resources and services of cloud providers from unauthorized access. Expand
Access control model with enhanced flexibility and scalability for cloud
  • R. Aluvalu, Lakshmi Muddana
  • Computer Science
  • 2015 International Conference on Green Computing and Internet of Things (ICGCIoT)
  • 2015
TLDR
HASBE scheme is worked with, which was developed by extending cipher text-policy attribute-set-based encryption (CP-ABE) with a hierarchical structure of users to overcome the limitation of scalability and flexibility. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 30 REFERENCES
ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT
TLDR
This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment, and leads to the design of attribute Based Access Control mechanism for cloud Computing. Expand
Towards temporal access control in cloud computing
TLDR
This paper presents an efficient temporal access control encryption scheme for cloud services with the help of cryptographic integer comparisons and a proxy-based re-encryption mechanism on the current time and provides a dual comparative expression of integer ranges to extend the power of attribute expression for implementing various temporal constraints. Expand
Negative Authorization in Access Control for Cloud Computing
Cloud computing is the next generation of platform over which information and services can be offered to the user in a more convenient and transparent way. On the other hand, however, commercialExpand
Secure Role based Data Access Control in Cloud Computing
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forthExpand
An Efficient Role Based Access Control System for Cloud Computing
coRBAC is a specifically optimized RBAC system for cloud computing environment. It inherits the existing RBAC's role model and dRBAC's domain model, optimizes and improves the access control systemExpand
DACC: Distributed Access Control in Clouds
  • S. Ruj, A. Nayak, I. Stojmenovic
  • Computer Science
  • 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2011
TLDR
This work proposes DACC (Distributed Access Control in Clouds) algorithm, where one or more KDCs distribute keys to data owners and users, where a single key replaces separate keys from owners. Expand
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TLDR
This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption. Expand
Privacy Enhanced Access Control for Outsourced Data Sharing
TLDR
This work proposes a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which provides acceptable communication overhead and at the same time limits the information that the cloud learns from his partial view of the access rules and the access patterns. Expand
Role-based Access Control on the Web Using LDAP
TLDR
This paper gives a framework for how to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the Web in the server-pull architecture and provides a comparison of this work to the previous work, RBAC on theWeb in the user- pull architecture. Expand
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
TLDR
The security of HASBE is formally proved based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt and its performance and computational complexity are formally analyzed. Expand
...
1
2
3
...