Efficient and Secure Data Access Control in the Cloud Environment

Efficient and Secure Data Access Control in the Cloud Environment

Anilkumar Chunduru, Gowtham Mamidisetti
DOI: 10.4018/978-1-7998-2367-4.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is a highly demanding zone in the present IT enterprise. The key characteristics are adaptability, productivity, pay-per-utilize, and cost viability. Access control and information security are the significant issues in cloud computing. Various access control strategies are present. The major problems of storing data in expandable access control and access rights from users are not used in this scheme. This chapter presents a generic survey on scalable and secure access control systems and schemes in cloud computing with a key focus on cloud security. Research gaps in the existing literature on cloud security are presented.
Chapter Preview
Top

Access control can be discussed as a system or mechanism that permits, denies or confines a client in information access from a framework (Yongdong Wu, Vivy Suhendra, & Huaqun Guo,2012). Users can use this system for choosing a particular framework, various assets and applications. An Access Control Standard (ACS) incorporates the strategy. (Xiao Wei Gao, Ze Min Jiang, & Rui Jiang, 2013) proposed an entryway based access control strategy in which a few private clouds are considered. Client of one private cloud can get the information from another private cloud. It gives a secured correspondence between clients by means of a third-party. But the principle issue of this scheme lies in accessing one association at any point of time. It does not support bi-directional access.

(David Ferraiolo, D. Richard Kuhn,& Ramaswamy Chandramouli, 2003)have proposed a plan for secure correspondence amongst the client and CSP. This plan settles the issue of replay assault and man-in-middle attack in the information retrieval stage. Issue in this method is DO should reliably stay online to access his data.

(Ryan Ausanka-Crues, 2001,pp. 20-25)proposed a mechanism for specific Role Based Access Control Model (RBAC). RBAC decides client's access to the framework in light of the activity part which is characterized as a base measure of authorizations that is important to finish a task. The primary issue emerges when RBAC is reached out crosswise over regulatory area of the association.

(Lili Sun & Hua Wang, 2010) proposed a procedure, which is a default control for desktop working frameworks. This gives a distinctive access arrangement to various client gatherings. This method enforces users to relay on cloud servers to access his data which becomes overhead from maintaining the whole system.

Complete Chapter List

Search this Book:
Reset