Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 337))

Abstract

Cloud computing, is an emerging computing paradigm, enabling users to remotely store their data in a server and provide services on-demand. In cloud computing cloud users and cloud service providers are almost certain to be from different trust domains. Cloud computing’s multitenancy and virtualization features pose unique security and access privilege challenges due to sharing of resources among potential un trusted tenants. Hence Privacy, trust and access control are the critical issues met in cloud computing. Access control is of vital importance in cloud computing environment, since it is concerned with allowing a user to access various cloud resources. A secure user enforced data access control mechanism must be provided before cloud users have the liberty to outsource sensitive data to the cloud for storage. Heterogeneity of services in cloud computing environment demands to adopt varying degrees of granularity in access control mechanism with an efficient encryption system. In this paper, we are going to analysis various Access control models for cloud computing and possible solutions for their limitations

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bijon, K.Z., Krishnan, R., Sandhu, R.: Risk-Aware RBAC Sessions. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 59–74. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Chen, L., Crampton, J.: Risk-Aware Role-Based Access Control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 140–156. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Kandala, S., Sandhu, R., Bhamidipati, V.: An Attribute Based Framework for Risk-Adaptive Access Control Models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES) (2011)

    Google Scholar 

  4. Brossard, D.: XACML 101 – a quick intro to Attribute-based Access Control with XACML (September 30, 2010), www.webframer.eu

  5. Bobba, R., Khurana, H., Prabhakarn, M.: Attribute sets a practically Motivated Enhancement to attribute based Encryption (July 27, 2009)

    Google Scholar 

  6. Cheng, Y., Park, J.-H.: Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on Social Computing (SocialCom), September 3-5 (2012)

    Google Scholar 

  7. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems (March 2012)

    Google Scholar 

  8. Sood, S.K.: A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications (November 2012)

    Google Scholar 

  9. Singhal, M., Chandrasekhar, S., Tingjian, G., Sandhu, R., Krishnan, R., Gail-Joon, A., Bertino, E.: Collaboration in multicloud computing environments: Framework and security issues. Computer 46(2) (February 2013)

    Google Scholar 

  10. Alhamad, M., Dillon, T., Chang, E.: SLA-Based Trust Model for Cloud Computing. In: 13th International Conference on Network-Based Information Systems (2010)

    Google Scholar 

  11. Gohad, A., Rao, P.S.: 1 * N Trust Establishment within Dynamic Collaborative Clouds. In: 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (2012)

    Google Scholar 

  12. Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT) (July 2010)

    Google Scholar 

  13. Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT) (2011)

    Google Scholar 

  14. Farcasescu, M.R.: Trust Model Engines in cloud computing. In: 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (2012)

    Google Scholar 

  15. Muchahari, M.K., Sinha, S.K.: A New Trust Management Architecture for Cloud Computing Environment. In: 2012 International Symposium on Cloud and Services Computing (2012)

    Google Scholar 

  16. Varadharajan, V., Tupakula, U.: TREASURE: Trust Enhanced Security for Cloud Environments. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012)

    Google Scholar 

  17. Priyadarsini, K., Thirumalai Selvan, C.: ’A Survey on Encryption Schemes for Data Sharing in Cloud Computing. IJCSITS 2(5) (October 2012) ISSN: 2249-9555

    Google Scholar 

  18. Antony, N., Melvin, A.A.R.: A Survey on Encryption Schemes in the Clouds for Access Control. International Journal of Computer Science and Management Research 1(5) (December 2012)

    Google Scholar 

  19. Betten Court, J.: Ciphertext-policy attribute based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334 (2007)

    Google Scholar 

  20. Zhu, Y., Huy, H., Ahny, G.-J., Huangy, D., Wang, S.: Towards Temporal Access Control in Cloud Computing. In: INFOCOM 2012 (2012)

    Google Scholar 

  21. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM 2010 (2010)

    Google Scholar 

  22. Wang, G., Liu, Q., Wub, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers (July 1, 2011)

    Google Scholar 

  23. Begum, R., Kumar, R.N., Kishore, V.: Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing 2(11) (November 2012)

    Google Scholar 

  24. Hota, C., Sankar, S.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03(03), 1152–1161 (2011)

    Google Scholar 

  25. Kandukuri, R., Paturi, V.R., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517–520 (September 2009)

    Google Scholar 

  26. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), 599–616 (2008)

    Article  Google Scholar 

  27. Salesforce.com, Inc., Force.com platform, http://www.salesforce.com/tw/ (retrieved December 2009)

  28. SAP AG, SAP services: maximize your success, http://www.sap.com/services/index.epx (retrieved January 2010)

  29. BOOK: Cloud computing Bible: Author: Sosinky, Barrie Edition. John Wiley & Sons Publication (2011)

    Google Scholar 

  30. Richardkun, D., et al.: Adding attributes to role based access control. IEEE-Computer 43(6)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to RajaniKanth Aluvalu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Aluvalu, R., Muddana, L. (2015). A Survey on Access Control Models in Cloud Computing. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13728-5_73

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13727-8

  • Online ISBN: 978-3-319-13728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics