A survey on access control mechanisms for cloud computing

Author(s):  
Rayane El Sibai ◽  
Nader Gemayel ◽  
Jacques Bou Abdo ◽  
Jacques Demerjian
Author(s):  
Subhash Chandra Patel ◽  
Sumit Jaiswal ◽  
Ravi Shankar Singh ◽  
Jyoti Chauhan

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.


Presently usage of smart mobiles increasing, due to internet availability most of users outsourcing their data to cloud but it is untrusted, so a security mechanism needed in this work proposing Homomorphic cipher text policy-Attribute based encryption (HCP-ABE), it derived from classic ABE. “Mobile cloud computing are combinations of mobile computing and cloud computing”, mobile applications are designed and hosted in cloud computing without verifying about mobile environment. Security models are constructed using Perturbation methods as per literature. These models are not secure compared to cryptographic techniques. When perturbation methods are used, Data reconstruction becomes a significant challenge. Hence computations are complicated to perform. Furthermore, this method suffers a trade-off between accuracy and privacy and most of the research work focused on key management issues and static access policies but due to user dynamic the access control mechanism should design for proactive strategies. To support dynamic access control and operations HCP-ABE scheme intended. In this paper we identify challenges associated with mobile cloud-based security system and possible provide solutions to understand existing research work conducting compressive review on different access control mechanisms.


2016 ◽  
pp. 1914-1936
Author(s):  
Qianqian Zhao ◽  
Maode Ma ◽  
Yuqing Zhang ◽  
Bingsheng He

Data sharing as one of the most popular service applications in cloud computing has received wide attention, which makes the consumers achieve the shared contents whenever and wherever possible. However, the new paradigm of data sharing will also introduce some security issues while it provides much convenience. The data confidentiality, the privacy security, the user key accountability, and the efficiency are hindering its rapid expansion. An effective and secure access control mechanism is becoming one way to deal with this dilemma. In this chapter, the authors focus on presenting a detailed review on the existing access control mechanisms. Then, they explore some potential research issues for the further development of more comprehensive and secure access control schemes. Finally, the authors expect that the topic of access control in cloud computing will attract much more attention from academia and industry.


2018 ◽  
Vol 7 (3) ◽  
pp. 1-36
Author(s):  
G�zde Karataş ◽  
Akhan Akbulut ◽  
◽  

Presently, usage of Cloud computing is increasing, due to internet availability most of Personal Health Record (PHR) owners outsourcing their records to the cloud, but it is untrusted, so a security mechanism needed in this paper proposing Dynamic Time-based encryption (DTBE), it derived from classic ABE. In the past, many researchers suggested different access controls for secure PHR. Still, most of the access control mechanisms introduce burden to the PHR owner while performing dynamic operations insertion, PHR user revocation, and when it updates, PHR users attribute list. Most of the ABE schemes have several limitations as it cannot efficiently handle adding or revoking users or identity attributes. It needs to keep multiple encrypted copies of the same key that incurs high computational costs. So, there is a need for a suitable access control mechanism that should support effective policies.


2018 ◽  
Vol 9 (2) ◽  
pp. 1-15 ◽  
Author(s):  
Subhash Chandra Patel ◽  
Sumit Jaiswal ◽  
Ravi Shankar Singh ◽  
Jyoti Chauhan

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.


Author(s):  
Qianqian Zhao ◽  
Maode Ma ◽  
Yuqing Zhang ◽  
Bingsheng He

Data sharing as one of the most popular service applications in cloud computing has received wide attention, which makes the consumers achieve the shared contents whenever and wherever possible. However, the new paradigm of data sharing will also introduce some security issues while it provides much convenience. The data confidentiality, the privacy security, the user key accountability, and the efficiency are hindering its rapid expansion. An effective and secure access control mechanism is becoming one way to deal with this dilemma. In this chapter, the authors focus on presenting a detailed review on the existing access control mechanisms. Then, they explore some potential research issues for the further development of more comprehensive and secure access control schemes. Finally, the authors expect that the topic of access control in cloud computing will attract much more attention from academia and industry.


2018 ◽  
Vol 1049 ◽  
pp. 012092
Author(s):  
Muhammad Rizwan Ghori ◽  
Abdulghani Ali Ahmed

Author(s):  
Habiba Sohail ◽  
Dhanalakshmi Venugopal

The focal point of this research maneuvers over the challenges and threats that are continuously being faced in cloud computing. Cloud computing is considered as one of the most versatile technology in the recent years. It is an innovative approach towards Information Systems and it has become an integral part of the IT industry. The paper aims to highlight the seriousness of the threats and challenges encountered in cloud computing. In this paper, we give an overview on what makes this technology the future of computing. Immense literature study was conducted to gather adequate data on the recent techniques and terminologies related to the research field. An in-depth research analysis presents a competent mechanism that identifies the challenges and threats in cloud computing. The paper also refers to different security breaches that occurred over the years and what measures were taken to overcome the catastrophic loss. Along with that, it also caters the alternative strategies and approaches available to overcome the possible security threats and challenges. Different alternative methods such as Cryptography and Access Control Mechanisms are identified which are feasible and can be utilized for enhancing the security in cloud computing. Cloud computing is no doubt growing in popularity but even the immensity of this technology cannot disguise the security issues that linger with it. After thoroughly investigating and inspecting all the literary resources, gathered data and information, it is discovered that although cloud computing is tremendously gaining its popularity in the IT field, concerns about its security impact have also been raised considerably. The conclusion of this paper provides different strategies to be adopted to condense the effect of security challenges in the chosen area of the research.     Keywords: Access Control, Cloud Application, Cloud Computing, Challenges,  Cryptography, Data Portability, Information System, Interoperability, PaaS, SaaS, Security, Threats, Virtualization;


Sign in / Sign up

Export Citation Format

Share Document