A survey on access control models in cloud computing

30Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing, is an emerging computing paradigm, enabling users to remotely store their data in a server and provide services on-demand. In cloud computing cloud users and cloud service providers are almost certain to be from different trust domains. Cloud computing’s multitenancy and virtualization features pose unique security and access privilege challenges due to sharing of resources among potential un trusted tenants. Hence Privacy, trust and access control are the critical issues met in cloud computing. Access control is of vital importance in cloud computing environment, since it is concerned with allowing a user to access various cloud resources. A secure user enforced data access control mechanism must be provided before cloud users have the liberty to outsource sensitive data to the cloud for storage. Heterogeneity of services in cloud computing environment demands to adopt varying degrees of granularity in access control mechanism with an efficient encryption system. In this paper, we are going to analysis various Access control models for cloud computing and possible solutions for their limitations.

Cite

CITATION STYLE

APA

Aluvalu, R. K., & Muddana, L. (2015). A survey on access control models in cloud computing. In Advances in Intelligent Systems and Computing (Vol. 337, pp. 653–664). Springer Verlag. https://doi.org/10.1007/978-3-319-13728-5_73

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free