PpBAC: Popularity Based Access Control Model for Cloud Computing

PpBAC: Popularity Based Access Control Model for Cloud Computing

Suyel Namasudra (Galgotias University, Uttar Pradesh, India) and Pinki Roy (National Institute of Technology, Silchar, India)
Copyright: © 2018 |Pages: 18
DOI: 10.4018/JOEUC.2018100102
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.
Article Preview

1. Introduction

In IT sector, cloud computing technology is widely used for the data communication process (Deka & Das, 2014). Cloud computing can be defined as a type of advanced area, where numerous distributed and parallel systems are interconnected. It involves many autonomous technologies like network system, utility computing, distributed processing, web services and hardware virtualization. The term “cloud computing” was first introduced in 1996 for describing a model, where all the desktop applications were running on the cloud. In 2007, cloud computing was accepted by all researchers, when a collaboration was made between Google and IBM. Cloud computing offers reducing IT cost, scalability, business continuity, flexibility and unlimited storage (Deka et al., 2013; Deka & Borah, 2012). It also offers users to use cloud when they demand it, and users need not to worry about the software or hardware in a cloud environment. In the cloud computing environment, the Cloud Service Provider (CSP) entity provides the cloud services. The Data Owner (DO) entity stores his/her data on the cloud environment, and cloud customers or users access files or data using the internet. By using the cloud computing, many business models are developed (Armbrust et al., 2010), which may be described by the term “X as a service (XaaS)”. Here, X may be hardware, platform, etc. With the gradually growth, cloud environment also faces many difficulties (Vaquero et al., 2011; Namasudra et al., 2017a; Xiao & Xiao, 2013). Data confidentiality, data security and access control are the most challenging issues of cloud computing.

Complete Article List

Search this Journal:
Volume 35: 1 Issue (2023): Forthcoming, Available for Pre-Order
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing