Ensuring Security in Cloud Computing Using Access Control: A Survey

  • Fatima Sifou
  • Ahmed Hammouch
  • Ali Kartit
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 37)


Currently, cloud computing has widely been implemented in several organizations. This is due to the fact that this new model delivers cost-efficient, flexibility and scalability computing resources to the clients. This has led to a growing demand of cloud implementations in different sectors. Although cloud computing facilitates data management, it still faces various security problems. So, it is important to examine cloud security issues before moving to this model. In particular, we focus on existing access control mechanisms in cloud computing. Actually, there exist multiple schemes that ensure data protection, such as DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role Base Access Control), ORBAC (Organizational Role Based Access Control) and ABAC (Attributes Based Access Control). The main contribution of this paper is to select the appropriate access control model that meets cloud constraints. Based on these considerations, ABAC model is more suitable to cloud environments compared to other models. In this regard, we provide a comprehensive taxonomy of different ABAC schemes.


Cloud computing Access control ABAC model ABE schemes 


  1. 1.
    Prince, J.: Security issues and their solution in cloud computing. Int. J. Comput. Bus. (2012)Google Scholar
  2. 2.
    Vikas, M., Srishti, G., Jyoti, K.: Network security: security in cloud computing. Int. J. Eng. Comput. Sci. 3(1), 3643–3651 (2014)Google Scholar
  3. 3.
    Cloud computing security considerations, April 2011. Accessed Sept 2012Google Scholar
  4. 4.
    Ronald, L.K., Russel, D.V.: Cloud Security a Comprehensive Guide to Secure Cloud Computing (2011).
  5. 5.
    All-of-Government Cloud Computing, Information Security and Privacy Considerations (2014).
  6. 6.
    Youssef, A.E.: Exploring cloud computing services and applications. J. Emerg. Trends Comput. Inf. Sci. 3(6) (2012)Google Scholar
  7. 7.
    Shyam, N.K., Amit, V.: A survey on secure cloud: security and privacy in cloud computing. Am. J. Syst. Softw. 4(1), 14–26 (2016). https://doi:10.12691/ajss-4-1-2
  8. 8.
    Rabi, P.P., Manas, R.P., Suresh, C.S.: Cloud computing: security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur. 1(2), 136–146 (2011)Google Scholar
  9. 9.
    Rohit, B., Sugata, S.: Survey on security issues in cloud computing and associated mitigation techniques. DBLP J. (2012)Google Scholar
  10. 10.
    Bhadauria, R., Chaki, R., Chaki, N., Sanyal, S.: Survey on security issues in cloud computing. ACTA TEHNICA CORVINIENSIS – Bulletin of Engineering, December 2014Google Scholar
  11. 11.
    Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8, 24–31 (2010)CrossRefGoogle Scholar
  12. 12.
    Ed-Daibouni, M., Lebbat, A., Tallal, S., Medromi, H.: Toward a new extension of the access control model ABAC for cloud computing. Springer, Singapore (2016)Google Scholar
  13. 13.
    Aluva, R.: Enhancing cloud security through access control models: a survey. Int. J. Comput. Appl. (2015).
  14. 14.
    Maw, H.A., Xiao, H., Christianson, B., Malco, J.A.: Survey of access control models in wireless sensor networks. J. Sensor Actuator Netw. 2014 3(2), 150–180 (2014). CrossRefGoogle Scholar
  15. 15.
    Bokefode Jayant, D., Apte Sulabha, S.: Analysis of DAC MAC RBAC access control based models for security. Int. J. Comput. Appl. 104, 0975–8887 (2014)Google Scholar
  16. 16.
    Majumder, A., Namasudra, S., Nath, S.: Taxonomy and classification of access control models for cloud environments. Springer, London (2014).
  17. 17.
    Punithasurya, K., Jeba, P.S.: Analysis of different access control mechanism in cloud. Int. J. Appl. Inf. Syst. (IJAIS) 4(2), 34–39 (2012)Google Scholar
  18. 18.
    Asim, M., Petkovic, M., Ignatengo, T.: Attribute-based encryption with encryption and decryption outsourcing. In: Australian Information Security Management Conference (2014)Google Scholar
  19. 19.
    Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environment. Int. J. Netw. Secur. 15(4), 231–240 (2013)Google Scholar
  20. 20.
    Tan, Y.-L., Goi, B.-M., Komiya, R., Tan, S.-Y.: A study of attribute-based encryption for body sensor networks. In: International Conference on Informatics Engineering and Information Science, pp. 238–247, November 2011Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Laboratory for Research in Computer Sciences and Telecommunications (LRIT), Faculty of ScienceMohammed V UniversityRabatMorocco
  2. 2.Laboratory LTI, Department TRI, ENSA-El JadidaChouaïb Doukkali UniversityEl JadidaMorocco

Personalised recommendations