Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

When it comes to relying on cloud computing, security and privacy has always been a serious concern. Replacing cloud computing with traditional means of computing is a huge risk especially for enterprises which value security the most. Due to the resource sharing nature of cloud and diverse groups of users, restricting access to resources appears to be the only way to protect information against unauthorized access. Allowing activities of legitimate users, requires a selective restriction of access to resources which can be enforced through an appropriate access control mechanism. In this paper, we will compare different access control models that are used in cloud computing namely Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) and discuss the limitations of each model.

Keywords: Cloud Computing, Security, Access Control Models, DAC, MAC, RBAC, ABAC

Edition: Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Share this Article

How to Cite this Article?

Mojtaba Mohamamdi, Keshav Kishore, "Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178415, Volume 6 Issue 11, November 2017, 1940 - 1943

107 PDF Views | 94 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Access Control Models'

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 159 - 162

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

Harvinder Singh, Er. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'DAC'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 750 - 754

A New Approach to Data Authentication in Cloud Storage

V. Abhiram, Srikakolapu NVSSST Murty

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1510 - 1513

A Survey on Optimal Data Storage of Cache Manager for Big Data Using Map Reduce Framework

Rupali Pashte, Ritesh Thakur

Share this Article

Similar Articles with Keyword 'MAC'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Similar Articles with Keyword 'RBAC'

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 159 - 162

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

Harvinder Singh, Er. Amandeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, Morocco, Volume 7 Issue 2, February 2018

Pages: 1492 - 1496

UIR - Middleware

Yassir Rouchdi, Khalid El Yassini, Kenza Oufaska

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 305 - 307

Data Security for Cloud Storage System Using Role Based Access Control

Prachi Shah

Share this Article

Similar Articles with Keyword 'ABAC'

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 616 - 619

Video Streaming Over Wireless Network by CABAC Arithmetic Coding with Generalized FNT Transform

Ayad A. Abdulsalam

Share this Article
Top