ABSTRACT
IT companies are largely adopting the emerging technology of cloud computing. Cloud computing technology provides cost-efficient computing resources with increased flexibility, and scalability. The primary concerns in cloud computing implementation are security and privacy. Access control models are used to address security threats and vulnerabilities. There are a variety of access control models, including DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role Base Access Control), ORBAC (Organizational Role Based Access Control) and ABAC (Attributes Based Access Control). As such it is important to analyze and compare the different existing access control models. To achieve this goal, we determine well defined criteria necessary within the context of current cloud computing requirements. Accordingly, we choose the appropriate model for the cloud environment.
- Iqbalinder, S. S., and Amardeep, K.. 2016. Review on advanced access control models in cloud computing. Textile Research Journal, Vol. 2, Issue 4, pp. 1--6 (JULY-AUG 2016).Google Scholar
- Malik, A. A, Hussain, B., and Kazmi, S. O. H.. 2016. Access control model for data stored on cloud computing. International Journal of Innovation and Scientific Research, Vol. 20, No. 1, 233--241( Jan.2016).Google Scholar
- CYBER SECURITY OPERATIONS CENTREJ. 2011. Cloud Computing Security Considerations. April 2011, update September 2012.Google Scholar
- Ronald, L. Kurtz, Russel. D. V,. 2011. Cloud security a comprensive guide to secure cloud computing. https://23510310jarinfo.files.wordpress.comGoogle Scholar
- All-of-Government Cloud Computing, 2014. Information Security and Privacy Considerations, April 2014. https://www.ict.govt.nzGoogle Scholar
- Ahmed E. Youssef. 2012. Exploring cloud computingGoogle Scholar
- services and applications. Journal of Emerging Trends in Computing and Information Sciences.Vol. 3, NO. 6 (July 2012).Google Scholar
- Bokefode Jayant. D., and Apte Sulabha S. 2014. Analysis of DAC MAC RBAC access control based models for Security. International Journal of Computer Applications. Pp. 0975--888, Vol. 104, October.2014.Google Scholar
- Majumder.A, Namasudra.S and Nath.S. 2014. Taxonomy and classification of access control models for cloud environments. Springer-Verlag, London 2014.Google ScholarCross Ref
- Punithasurya.K., andJeba Priya.S,2012. Analysis of different access control mechanism in cloud. International Journal of Applied Information Systems (IJAIS). Vol. 4, No. 2 September, 2012.Google Scholar
- M. Ennahbaoui, S. Elhajji. 2013. Study of access control models. Proceedings of the World Congress on Engineering, 2013, Vol. 2, WCE London, U.K.Google Scholar
- A. Ait Ouahman, A. Abou El Kalam, I. Bouij-Pasquier. 2015. Smart OrBAC: Enforcing security in the Internet of Things. International Journal of Advanced Computer Science and Applications, Vol. 6, No. 11, 2015Google Scholar
- Ed-Daibouni, M., Lebbat, A., Tallal, S., and Medromi, H. 2016. Toward a new extension of the access control model ABAC for cloud computing. Springer Science and Business Media Singapore, 2016.Google Scholar
- Rajanikanth Aluva. 2015. Enhancing cloud security through access control models: a survey. International Journal of Computer Applications. 2015Google Scholar
- H. Aung Maw, H. Xiao, B. Christianson and J. A. Malcol. 2014. Survey of access control models in wireless sensor networks. Journal of Sensor and Actuator Networks 2014, san3, 150--180;Google Scholar
Recommendations
An access control model for cloud computing
Cloud computing is considered one of the most dominant paradigms in the Information Technology (IT) industry these days. It offers new cost effective services on-demand such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and ...
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
The Proposed scheme employs Ciphertext-policy Attribute-Set-Based Encryption for secure sharing of data using cloud servers.The proposed scheme provides users complete liberty on delegation of their access privileges.Shared access privileges are ...
Research on Security of Access Control for Cloud Computing Environment
Security, Privacy, and Anonymity in Computation, Communication, and StorageAbstractCloud computing is considered as one of the most dominant paradigms in the Information Technology industry these days. It offers new cost effective services. With the rapid development of cloud computing, cloud security issues are becoming ...
Comments