skip to main content
10.1145/3141128.3141133acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbdcConference Proceedingsconference-collections
research-article

Different Access Control Mechanisms for Data Security in Cloud Computing

Authors Info & Claims
Published:17 September 2017Publication History

ABSTRACT

IT companies are largely adopting the emerging technology of cloud computing. Cloud computing technology provides cost-efficient computing resources with increased flexibility, and scalability. The primary concerns in cloud computing implementation are security and privacy. Access control models are used to address security threats and vulnerabilities. There are a variety of access control models, including DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role Base Access Control), ORBAC (Organizational Role Based Access Control) and ABAC (Attributes Based Access Control). As such it is important to analyze and compare the different existing access control models. To achieve this goal, we determine well defined criteria necessary within the context of current cloud computing requirements. Accordingly, we choose the appropriate model for the cloud environment.

References

  1. Iqbalinder, S. S., and Amardeep, K.. 2016. Review on advanced access control models in cloud computing. Textile Research Journal, Vol. 2, Issue 4, pp. 1--6 (JULY-AUG 2016).Google ScholarGoogle Scholar
  2. Malik, A. A, Hussain, B., and Kazmi, S. O. H.. 2016. Access control model for data stored on cloud computing. International Journal of Innovation and Scientific Research, Vol. 20, No. 1, 233--241( Jan.2016).Google ScholarGoogle Scholar
  3. CYBER SECURITY OPERATIONS CENTREJ. 2011. Cloud Computing Security Considerations. April 2011, update September 2012.Google ScholarGoogle Scholar
  4. Ronald, L. Kurtz, Russel. D. V,. 2011. Cloud security a comprensive guide to secure cloud computing. https://23510310jarinfo.files.wordpress.comGoogle ScholarGoogle Scholar
  5. All-of-Government Cloud Computing, 2014. Information Security and Privacy Considerations, April 2014. https://www.ict.govt.nzGoogle ScholarGoogle Scholar
  6. Ahmed E. Youssef. 2012. Exploring cloud computingGoogle ScholarGoogle Scholar
  7. services and applications. Journal of Emerging Trends in Computing and Information Sciences.Vol. 3, NO. 6 (July 2012).Google ScholarGoogle Scholar
  8. Bokefode Jayant. D., and Apte Sulabha S. 2014. Analysis of DAC MAC RBAC access control based models for Security. International Journal of Computer Applications. Pp. 0975--888, Vol. 104, October.2014.Google ScholarGoogle Scholar
  9. Majumder.A, Namasudra.S and Nath.S. 2014. Taxonomy and classification of access control models for cloud environments. Springer-Verlag, London 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. Punithasurya.K., andJeba Priya.S,2012. Analysis of different access control mechanism in cloud. International Journal of Applied Information Systems (IJAIS). Vol. 4, No. 2 September, 2012.Google ScholarGoogle Scholar
  11. M. Ennahbaoui, S. Elhajji. 2013. Study of access control models. Proceedings of the World Congress on Engineering, 2013, Vol. 2, WCE London, U.K.Google ScholarGoogle Scholar
  12. A. Ait Ouahman, A. Abou El Kalam, I. Bouij-Pasquier. 2015. Smart OrBAC: Enforcing security in the Internet of Things. International Journal of Advanced Computer Science and Applications, Vol. 6, No. 11, 2015Google ScholarGoogle Scholar
  13. Ed-Daibouni, M., Lebbat, A., Tallal, S., and Medromi, H. 2016. Toward a new extension of the access control model ABAC for cloud computing. Springer Science and Business Media Singapore, 2016.Google ScholarGoogle Scholar
  14. Rajanikanth Aluva. 2015. Enhancing cloud security through access control models: a survey. International Journal of Computer Applications. 2015Google ScholarGoogle Scholar
  15. H. Aung Maw, H. Xiao, B. Christianson and J. A. Malcol. 2014. Survey of access control models in wireless sensor networks. Journal of Sensor and Actuator Networks 2014, san3, 150--180;Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCBDC '17: Proceedings of the 2017 International Conference on Cloud and Big Data Computing
    September 2017
    135 pages
    ISBN:9781450353434
    DOI:10.1145/3141128

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 September 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader