CFP last date
20 May 2024
Reseach Article

Evaluation of Access Control Techniques in Cloud Computing

by Devyani Patil, Nilesh Mahajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 17
Year of Publication: 2020
Authors: Devyani Patil, Nilesh Mahajan
10.5120/ijca2020920130

Devyani Patil, Nilesh Mahajan . Evaluation of Access Control Techniques in Cloud Computing. International Journal of Computer Applications. 176, 17 ( Apr 2020), 22-25. DOI=10.5120/ijca2020920130

@article{ 10.5120/ijca2020920130,
author = { Devyani Patil, Nilesh Mahajan },
title = { Evaluation of Access Control Techniques in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2020 },
volume = { 176 },
number = { 17 },
month = { Apr },
year = { 2020 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number17/31294-2020920130/ },
doi = { 10.5120/ijca2020920130 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:42:48.317101+05:30
%A Devyani Patil
%A Nilesh Mahajan
%T Evaluation of Access Control Techniques in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 17
%P 22-25
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is an advanced evolving technology. It is a technology in which authorised user can store, retrieve and delete data from cloud computing environment. Mostly it is used for storage of data because now a day’s storage of data in safe space is a critical problem. Data kept in cloud can be retrieved any time and at any place, if you are legitimate user and having internet access. Main benefit of use of this technology is you don’t worry about the data storage capacity, equipment purchasing and access speed. Even with of this technology data sharing is very easy. According to use of this technology cloud computing is categorised into service models as SaaS, PassS and IaaS. As data security is depends on user authentication it is also depends on access control.

References
  1. https://en.wikipedia.org/wiki
  2. Y.G.Min, Y.H.Bang, “Cloud Computing Security Issues and Access Control Solutions”, Journel of Security Engineering, vol.2, 2012.
  3. A.R.Khan, ARPN “Access Control in Cloud Computing Environment,” Journal of Engineering and Applied Sciences, vol 7, no 5, MAY 2012.
  4. Almubaddel, M., and Elmogy, A. M. (2016). “Cloud computing antecedents, challenges, and directions”.International Conference on Internet of things and Cloud Computing
  5. Ahmadi, M., Chizari, M., Eslami, M., Golkar, M. J., and Vali, M. (2015). “Access control and user authentication concerns in cloud computing environments.” International Conference on Telematics and Future Generation Networks (TAFGEN)
  6. http://www.cio.com/topic/3024/Cloud_Computing
  7. Khan, M. F. F., and Sakamura, K. (2015). “Fine-grained access control to medical records in digital healthcare enterprises.” International Symposium on, Networks, Computers and Communications (ISNCC), 2015
  8. Msahli, M., Chen, X., and Serhrouchni, A. (2014). “Towards a fine-grained access control for cloud.” IEEE 11th International Conference on, e-Business Engineering (ICEBE), 2014
  9. Bhatt, S., Patwa, F., and Sandhu, R. (2016). “An attribute-based access control extension for openstack and its enforcement utilizing the policy machine.” IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
  10. Heitor Henrique de Paula Moraes Costa, Aletéia Patrícia Favacho de Araújo, JoaJosé Costa Gondim, Maristela Terto de Holanda, and Maria Emília Machado Telles Walter. “Attribute based access control in federated clouds: A case study in bioinformatics”. 12th Iberian Conference on Information Systems and Technologies
  11. Wang, R., Azab, A. M., Enck, W., Li, N., Ning, P., Chen, X., and Cheng, Y. (2017). SPOKE: “Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android”. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
  12. Lei, Z., Hongli, Z., Lihua, Y., and Xiajiong, S. (2011). “A mandatory access control model based on concept lattice.” International Conference on Network Computing and Information Security (NCIS)
  13. Taubmann, B., Rakotondravony, N., and Reiser, H. P. (2016). “Cloudphylactor: Harnessing mandatory access control for virtual machine introspection in cloud data centers.” Trustcom/BigDataSE/I SPA, IEEE
  14. Punithasurya, K., and Jeba Priya, S. (2012). “Analysis of different access control mechanism in cloud.”  International Journal of Applied Information Systems (IJAIS)
  15. Wang, G., Liu, Q., Wu, J., and Guo, M. (2011). “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.”computers & security
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Authentication Data Storage and Access Control