B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya
{"title":"Survey of access control models for cloud based real-time applications","authors":"B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya","doi":"10.1109/ICIICT.2015.7396065","DOIUrl":null,"url":null,"abstract":"Cloud computing is one of the prominent technologies in this century. Due to its various features and capabilities, it attracted a large population towards it. Cloud is a huge pool of resources which is owned and managed by the third parties collectively called as Cloud Service Provider (CSP). The users enjoy the freedom in using the resources at their ease that has been deployed in the cloud. Irrespective of the place, the computing resources could be accessed by the user via internet services. It also provides the advantage of using the cloud services as per end user's demand. As each coin has two faces, the cloud computing strategy also has an evil face. The major drawback lies in securing the sensitive information and preserving the privacy details. To throw light upon this fact and to overcome this, a new terminology has been emerged in the cloud environment called \"Access Control\". This Access Control has travelled a long way in recent times. Among many techniques of access control, DAC, MAC, RBAC and ABAC prove to clear the security issues prevailed in cloud storage environment. Today's business market is totally depends on real-time applications and E-shopping applications as the country's major economy is derived from it. Many eminent researches have been carried out by the scientists to apply the access control in application scenario. In this paper, we have analysed the major business applications, the security issues currently faced by them and we have suggested which of the access control models would be efficient to make them more secure and enjoyable to use.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Confernce on Innovation Information in Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT.2015.7396065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Cloud computing is one of the prominent technologies in this century. Due to its various features and capabilities, it attracted a large population towards it. Cloud is a huge pool of resources which is owned and managed by the third parties collectively called as Cloud Service Provider (CSP). The users enjoy the freedom in using the resources at their ease that has been deployed in the cloud. Irrespective of the place, the computing resources could be accessed by the user via internet services. It also provides the advantage of using the cloud services as per end user's demand. As each coin has two faces, the cloud computing strategy also has an evil face. The major drawback lies in securing the sensitive information and preserving the privacy details. To throw light upon this fact and to overcome this, a new terminology has been emerged in the cloud environment called "Access Control". This Access Control has travelled a long way in recent times. Among many techniques of access control, DAC, MAC, RBAC and ABAC prove to clear the security issues prevailed in cloud storage environment. Today's business market is totally depends on real-time applications and E-shopping applications as the country's major economy is derived from it. Many eminent researches have been carried out by the scientists to apply the access control in application scenario. In this paper, we have analysed the major business applications, the security issues currently faced by them and we have suggested which of the access control models would be efficient to make them more secure and enjoyable to use.