Review Papers | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017
Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
When it comes to relying on cloud computing, security and privacy has always been a serious concern. Replacing cloud computing with traditional means of computing is a huge risk especially for enterprises which value security the most. Due to the resource sharing nature of cloud and diverse groups of users, restricting access to resources appears to be the only way to protect information against unauthorized access. Allowing activities of legitimate users, requires a selective restriction of access to resources which can be enforced through an appropriate access control mechanism. In this paper, we will compare different access control models that are used in cloud computing namely Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) and discuss the limitations of each model.
Keywords: Cloud Computing, Security, Access Control Models, DAC, MAC, RBAC, ABAC
Edition: Volume 6 Issue 11, November 2017
Pages: 1940 - 1943
How to Cite this Article?
Mojtaba Mohamamdi, Keshav Kishore, "Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178415, Volume 6 Issue 11, November 2017, 1940 - 1943
107 PDF Views | 94 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Access Control Models'
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 159 - 162Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review
Harvinder Singh, Er. Amandeep Kaur
Similar Articles with Keyword 'DAC'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 750 - 754A New Approach to Data Authentication in Cloud Storage
V. Abhiram, Srikakolapu NVSSST Murty
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1510 - 1513A Survey on Optimal Data Storage of Cache Manager for Big Data Using Map Reduce Framework
Rupali Pashte, Ritesh Thakur
Similar Articles with Keyword 'MAC'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Similar Articles with Keyword 'RBAC'
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 159 - 162Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review
Harvinder Singh, Er. Amandeep Kaur
Research Paper, Computer Science & Engineering, Morocco, Volume 7 Issue 2, February 2018
Pages: 1492 - 1496UIR - Middleware
Yassir Rouchdi, Khalid El Yassini, Kenza Oufaska
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 305 - 307Data Security for Cloud Storage System Using Role Based Access Control
Prachi Shah
Similar Articles with Keyword 'ABAC'
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore
Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018
Pages: 616 - 619Video Streaming Over Wireless Network by CABAC Arithmetic Coding with Generalized FNT Transform
Ayad A. Abdulsalam