CFP last date
20 December 2024
Reseach Article

Enhancing Cloud Security through Access Control Models: A Survey

by Chirag Langaliya, Rajanikanth Aluvalu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 7
Year of Publication: 2015
Authors: Chirag Langaliya, Rajanikanth Aluvalu
10.5120/19677-1400

Chirag Langaliya, Rajanikanth Aluvalu . Enhancing Cloud Security through Access Control Models: A Survey. International Journal of Computer Applications. 112, 7 ( February 2015), 8-12. DOI=10.5120/19677-1400

@article{ 10.5120/19677-1400,
author = { Chirag Langaliya, Rajanikanth Aluvalu },
title = { Enhancing Cloud Security through Access Control Models: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 7 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number7/19677-1400/ },
doi = { 10.5120/19677-1400 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:48.256288+05:30
%A Chirag Langaliya
%A Rajanikanth Aluvalu
%T Enhancing Cloud Security through Access Control Models: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 7
%P 8-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a new computing paradigm in which an application can run on connected Cloud Server instead of local server. Cloud computing provides efficient data storage, resource sharing and services in a distributed manner with great ease. However Cloud computing is having issues like security and privacy of data when sensitive data is stored under third party cloud service providers. Various access control models have been proposed to resolve the security issue in cloud computing. So in this paper we have discussed various access control models starting from the traditionally DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control) to the latest ABE (Attribute Based Encryption) models like CP-ABE (Ciphertext Policy - Attribute Based Encryption), KP-ABE (Key Policy Attribute Based Encryption), HABE (Hierarchical Attribute Based Encryption) and HASBE (Hierarchical Attribute - Set Base Encryption).

References
  1. Mavridis Ioannis "Towards new access control models for cloud computing systems"
  2. Rajanikanth aluvalu, lakshmi Muddana "A Survey on Access Control Models in Cloud Computing" Springer International Publishing, Advances in Intelligent Systems and Computing 337, DOI: 10. 1007/978-3-319-13728-5_7.
  3. Punithasurya K, Jeba Priya S "Analysis of Different Access Control Mechanism in Cloud", International journal of Applied Information Systems, Vol. 4, September 2012
  4. Parmindar Singh, Sarpreet Singh "Cross Bread Role based Acces Control for Exteded Security at Azure in Cloud Computing" Internatonal Journal of Application or Innovation in Engineering and Management, Vol, 2, February 2013
  5. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inProc. EUROCRYPT, 2005, pp. 457473
  6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attibute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.
  7. J. Bette ncourt, A. Sahai, and B. Waters"Ciphertext-policy attribute based encryption "in Proceedings of IEEE Symposium on Security and Privacy, pp. 321V334, 2007.
  8. Q. Liu, G. Wang, and J. Wu, "Time based proxy re-encryption scheme for secure data sharing in a cloud environment," Information Sciences . In Press, 2012.
  9. Zhiguo Wan, Jun'e Liu, and Robert H. Deng "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012
  10. R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Proc. ESORICS, Saint Malo, France, 2009.
  11. Sanjay Tiwari, Khushbu Sharma "Review on Cloud Computing Security Measure – Role-Based Access Control" International Journal of Advanced Research in Computer Science and Software Engineering
  12. N. krishna, L. Bhavani "HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing" International Journal of Computer & Organization Trends –Volume 3 Issue 9 – Oct 2013
  13. John Bethencourt, Computer Sciences Department Carnegie Mellon University," Intro to Bilinear Maps"
Index Terms

Computer Science
Information Sciences

Keywords

ABE based Access control models Cloud computing HASBE Traditional Access Control Models