Survey of access control models for cloud based real-time applications

B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya
{"title":"Survey of access control models for cloud based real-time applications","authors":"B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya","doi":"10.1109/ICIICT.2015.7396065","DOIUrl":null,"url":null,"abstract":"Cloud computing is one of the prominent technologies in this century. Due to its various features and capabilities, it attracted a large population towards it. Cloud is a huge pool of resources which is owned and managed by the third parties collectively called as Cloud Service Provider (CSP). The users enjoy the freedom in using the resources at their ease that has been deployed in the cloud. Irrespective of the place, the computing resources could be accessed by the user via internet services. It also provides the advantage of using the cloud services as per end user's demand. As each coin has two faces, the cloud computing strategy also has an evil face. The major drawback lies in securing the sensitive information and preserving the privacy details. To throw light upon this fact and to overcome this, a new terminology has been emerged in the cloud environment called \"Access Control\". This Access Control has travelled a long way in recent times. Among many techniques of access control, DAC, MAC, RBAC and ABAC prove to clear the security issues prevailed in cloud storage environment. Today's business market is totally depends on real-time applications and E-shopping applications as the country's major economy is derived from it. Many eminent researches have been carried out by the scientists to apply the access control in application scenario. In this paper, we have analysed the major business applications, the security issues currently faced by them and we have suggested which of the access control models would be efficient to make them more secure and enjoyable to use.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Confernce on Innovation Information in Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT.2015.7396065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Cloud computing is one of the prominent technologies in this century. Due to its various features and capabilities, it attracted a large population towards it. Cloud is a huge pool of resources which is owned and managed by the third parties collectively called as Cloud Service Provider (CSP). The users enjoy the freedom in using the resources at their ease that has been deployed in the cloud. Irrespective of the place, the computing resources could be accessed by the user via internet services. It also provides the advantage of using the cloud services as per end user's demand. As each coin has two faces, the cloud computing strategy also has an evil face. The major drawback lies in securing the sensitive information and preserving the privacy details. To throw light upon this fact and to overcome this, a new terminology has been emerged in the cloud environment called "Access Control". This Access Control has travelled a long way in recent times. Among many techniques of access control, DAC, MAC, RBAC and ABAC prove to clear the security issues prevailed in cloud storage environment. Today's business market is totally depends on real-time applications and E-shopping applications as the country's major economy is derived from it. Many eminent researches have been carried out by the scientists to apply the access control in application scenario. In this paper, we have analysed the major business applications, the security issues currently faced by them and we have suggested which of the access control models would be efficient to make them more secure and enjoyable to use.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于云的实时应用访问控制模型综述
云计算是本世纪最突出的技术之一。由于它的各种特点和功能,它吸引了大量的人口。云是一个巨大的资源池,由第三方拥有和管理,统称为云服务提供商(CSP)。用户可以自由地使用部署在云中的资源。无论在哪里,用户都可以通过互联网服务访问计算资源。它还提供了根据最终用户的需求使用云服务的优势。正如每个硬币都有两面,云计算策略也有邪恶的一面。主要缺点在于保护敏感信息和保留隐私细节。为了阐明这一事实并克服这一问题,在云环境中出现了一个名为“访问控制”的新术语。这种访问控制在最近的时间里已经走了很长一段路。在众多的访问控制技术中,DAC、MAC、RBAC和ABAC被证明能够解决云存储环境中普遍存在的安全问题。今天的商业市场完全依赖于实时应用程序和电子购物应用程序,因为该国的主要经济来源于它。在应用场景中应用访问控制方面,科学家们进行了许多卓有成效的研究。在本文中,我们分析了主要的业务应用程序,他们目前面临的安全问题,我们提出了哪些访问控制模型将是有效的,使他们更安全,更愉快地使用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Secure mobile grid environment defeating wormhole attacks and scam users An algebra for composing access control policies in cloud An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks Ontology construction for explicit description of domain knowledge HS-TBAC a highly secured token based access control for outsourced data in cloud
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1