Analysis of Security-Based Access Control Models for Cloud Computing

Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.

[1]  Kouichi Sakurai,et al.  A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing , 2017, Comput. Electr. Eng..

[2]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[3]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[4]  Madjid Merabti,et al.  An access control model for cloud computing , 2014, J. Inf. Secur. Appl..

[5]  Rizwan Patan,et al.  Security, Privacy, Trust, and Anonymity , 2018, Advances of DNA Computing in Cryptography.

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Lili Sun,et al.  A purpose based usage access control model , 2010 .

[8]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[9]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[10]  Cynthia E. Irvine,et al.  A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[11]  Pierre Riteau Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.

[12]  Javier López,et al.  Access control for cyber-physical systems interconnected to the cloud , 2018, Comput. Networks.

[13]  Chittaranjan Hota,et al.  Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .

[14]  Luigi Coppolino,et al.  Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..

[15]  Danwei Chen,et al.  Access Control of Cloud Service Based on UCON , 2009, CloudCom.

[16]  Seog Park,et al.  Task-role-based access control model , 2003, Inf. Syst..

[17]  O. KuyoroS. Cloud Computing Security Issues and Challenges , 2011 .