Literature Survey of Role Policy Access Using Cloud

Cloud Computing is a technology that consists of an internal server and a common server which is used to store data in it in such a way that it can be accessed universally. Big data is a collection of a large data set or data modules. Various studies have been made where the successful integration of cloud and big data have been performed. The advantage of linking big data with cloud is that the data availability becomes global and could be accessed easily. This opens the data up for vandalism and could be easily manipulated. To ensure proper data integrity, different encryption techniques could be used to provide security to the data. Role-Based policy access is an access policy, which provides access to the end users based upon their attributes, which are used to supposedly authenticate the user. It gives the end user the privileges like file access, file modification and updating. This survey determines in various ways that role policy access using cloud has its own advantages and disadvantages.

[1]  Dalit Naor,et al.  Capability based Secure Access Control to Networked Storage Devices , 2007, 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007).

[2]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[3]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[4]  Mahendra Pratap Singh AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[5]  Andrew S. Grimshaw,et al.  LegionFS: A Secure and Scalable File System Supporting Cross-Domain High-Performance Applications , 2001, International Conference on Software Composition.

[6]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[7]  Xin Chen,et al.  An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.

[8]  Martín Abadi,et al.  Formal security analysis of basic network-attached storage , 2005, FMSE '05.

[9]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[10]  Hui Li,et al.  Owner Specified Excessive Access Control for Attribute Based Encryption , 2016, IEEE Access.

[11]  B. Balamurugan,et al.  An algebra for composing access control policies in cloud , 2015, International Confernce on Innovation Information in Computing Technologies.

[12]  Arnon Rosenthal,et al.  Methodological Review: Cloud computing: A new business paradigm for biomedical information sharing , 2010 .