International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 179 - Number 11 |
Year of Publication: 2018 |
Authors: Roslin Dayana K., Vigilson Prem M. |
10.5120/ijca2018916124 |
Roslin Dayana K., Vigilson Prem M. . Review of the Various Optimized Access Control Techniques for Big Data in Cloud Environment. International Journal of Computer Applications. 179, 11 ( Jan 2018), 41-45. DOI=10.5120/ijca2018916124
Cloud computing is an information technology (IT) domain that enables efficient access to shared and private collection of configurable system resources. It provides higher-level services that can be very quickly provisioned at a greater rate with minimum amount of effort for management, mostly over the Internet. Due to the high complexity and huge volume, outsourcing ciphertexts to a cloud is deemed to be one of the most effective approaches for big data storage and access. Verifying the access legitimacy of a user and securely updating a ciphertext in the cloud based on a new access policy designated by the data owner are two critical challenges. The access policy update is important for enhancing security and dealing with the dynamism caused by user join and leave activities. In this paper, the two different approaches developed recently to provide the secure, verifiable and flexible access control of Big data storage in cloud are discussed to solve the above challenges. The working and drawbacks of different schemes developed in the past for the access control are also discussed.