Analysis of Access Control Methods in Cloud Computing

Full Text (PDF, 334KB), PP.15-24

Views: 0 Downloads: 0

Author(s)

Madhura Mulimani 1 Rashmi Rachh 1

1. Visvesvaraya Technological University (VTU), Machhe, Belgaum – 590018, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2017.03.02

Received: 11 Jan. 2017 / Revised: 24 Feb. 2017 / Accepted: 7 Apr. 2017 / Published: 8 May 2017

Index Terms

Role-based access control, attribute-based access control, attribute-based encryption

Abstract

Cloud Computing is a promising and emerging technology that is rapidly being adopted by many IT companies due to a number of benefits that it provides, such as large storage space, low investment cost, virtualization, resource sharing, etc. Users are able to store a vast amount of data and information in the cloud and access it from anywhere, anytime on a pay-per-use basis. Many users are able to share the data and the resources stored in the cloud. Hence, there arises a need to provide access to the data to only those users who are authorized to access it. This can be done by enforcing access control schemes which allow only the authenticated and authorized users to access the data and deny access to unauthorized users. In this paper, a comprehensive review of all the existing access control schemes has been discussed along with the analysis of these schemes.

Cite This Paper

Madhura Mulimani, Rashmi Rachh,"Analysis of Access Control Methods in Cloud Computing", International Journal of Education and Management Engineering(IJEME), Vol.7, No.3, pp.15-24, 2017.DOI: 10.5815/ijeme.2017.03.02

Reference

[1]RajaniKanth Aluvalu, Lakshmi Muddana, "A Survey on Access Control Models in Cloud Computing", Springer International Publishing Switzerland 2015 S.C. Satapathy et al.(eds.), Emerging ICT for Bridging the Future – Vol. 1, Advances in Intelligent Systems and Computing 337, DOI: 10.1007/978-3-319-13728-5_73 pp. 653.

[2]D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil, "Adding Attributes to Role-based Access Control", IEEE Computer Society, vol. 43, No. 6, pp. 79 – 81, (June 2010).

[3]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang, "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing", Proc. 2nd IEEE International Conference on Cloud Computing Technology and Science, IEEE Computer Society, (2010).

[4]Sushmita Ruj, Milos Stojmenovic, Amiya Nayak, "Privacy Preserving Access Control with Authentication for Securing Data in Clouds", 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2012, pp. 556 – 563.

[5]Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data", ACM CCS'06, Alexandria, Virginia, USA, (October 30 – November 3, 2006).

[6]Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic, "DACC: Distributed Access Control in Clouds", International Joint Conference of IEEE TrustCom – 11, IEEE Computer Society, pp. 91 – 98, (2011) 

[7]Ryan Ausanka-Crues, "Methods of Access Control: Advances and Limitations".

[8]Natarajan Meghanathan, "Review of Access Control Models for Cloud Computing", David C. Wyld (Eds): ICCSEA, SPPR, CSIA, WimoA – 2013, pp. 77–85, 2013.

[9]Ravi S. Sandhu and Pierangela Samarati, "Access Control: Principles and Practice", IEEE Communications Magazine, September 1994.

[10]Abdul Raouf Khan, "Access Control in Cloud Computing Environment", ARPN Journal of Engineering and Applied Science, Vol 7, No.5 May 2012.

[11]P. G. Shynu, K. John Singh, "A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment".

[12]Sascha M¨uller, Stefan Katzenbeisser, and Claudia Eckert "Distributed Attribute-Based Encryption", LNCS 5461, pp. 20–36, 2009, Springer-Verlag Berlin Heidelberg 2009.

[13]ByungRae Cha, JaeHyun Seo, Jong Won Kim, "Design of Attribute-Based Access Control in Cloud Computing Environment", Proceedings of the International Conference on IT Convergence and Security 2011, Springer Science, +Business Media B. V. 2012.

[14]Xin Jin, Ram Krishnan, Ravi Sandhu, "A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC".

[15]Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang, "Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environment", International Journal of Network Security, Vol. 15, No. 4, PP. 231 – 240, July 2013.

[16]Piretti et al., "Secure Attribute-Based Systems", CCS'06, October 30–November 3, 2006, Alexandria, Virginia, USA. Copyright 2006 ACM.

[17]Subhashini Venugopalan, "Efficient Multi-level Threshold Attribute Based Encryption".

[18]Yong Cheng, et al., "Efficient Revocation in Ciphertext-Policy Attribute-based Encryption based Cryptographic Cloud Storage", Journal of Zhejiang University-SCIENCE C (Computers & Electronics) ISSN 1869-1951 (Print); ISSN 1869-196X (Online), Zhejiang University and Springer-Verlag Berlin Heidelberg 2013.

[19]John Bethencourt, Amit Sahai, Brent Waters "Ciphertext-policy attribute-based encryption", IEEE Symposium on Security and Privacy", Pages 321–334, 2007.

[20]Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", INFOCOM '10 Proceedings of the 29th Conference on Information Communications, Pages 534-542.