Header menu link for other important links
X
Survey on access control issues in cloud computing
, M. Aramudhan
Published in Institute of Electrical and Electronics Engineers Inc.
2016
Abstract
Cloud computing is the use of computing resources like hardware and software that are delivered as a service over a network. It confides remote services with a user's data and software, it enables a user to do large amount of storage, large amount of computations. Due to which data security in cloud becomes a big issues. Data access control provides the security of data in the cloud. The large amount of data outsourced in cloud servers, the data access control becomes a challenging issue in cloud storage systems. We have many access control security solution like Attribute based, Role based, Hierarchical identity management, Identity based authentication, Trust based model etc. Cloud computing is one recent technologies. So it becomes very necessary to secure the data as well as privacy of users. Access Control methods provide an effective way to ensure that authorized user's access the data and the system. In this paper we discussed various features of attribute based Encryption, Role based, Hierarchical identity management, Identity based authentication, Trust based model suitable for cloud computing environment. © 2016 IEEE.