International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 224

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017 | Popularity: 6.1 / 10


     

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore


Abstract: When it comes to relying on cloud computing, security and privacy has always been a serious concern. Replacing cloud computing with traditional means of computing is a huge risk especially for enterprises which value security the most. Due to the resource sharing nature of cloud and diverse groups of users, restricting access to resources appears to be the only way to protect information against unauthorized access. Allowing activities of legitimate users, requires a selective restriction of access to resources which can be enforced through an appropriate access control mechanism. In this paper, we will compare different access control models that are used in cloud computing namely Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) and discuss the limitations of each model.


Keywords: Cloud Computing, Security, Access Control Models, DAC, MAC, RBAC, ABAC


Edition: Volume 6 Issue 11, November 2017


Pages: 1940 - 1943



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mojtaba Mohamamdi, Keshav Kishore, "Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment", International Journal of Science and Research (IJSR), Volume 6 Issue 11, November 2017, pp. 1940-1943, https://www.ijsr.net/getabstract.php?paperid=ART20178415, DOI: https://www.doi.org/10.21275/ART20178415



Similar Articles

Downloads: 119

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 159 - 162

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication - A Review

Harvinder Singh, Er. Amandeep Kaur

Share this Article

Downloads: 126

Research Paper, Computer Science & Engineering, Morocco, Volume 7 Issue 2, February 2018

Pages: 1492 - 1496

UIR - Middleware

Yassir Rouchdi, Khalid El Yassini, Kenza Oufaska

Share this Article

Downloads: 130

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 305 - 307

Data Security for Cloud Storage System Using Role Based Access Control

Prachi Shah

Share this Article

Downloads: 142

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 616 - 619

Video Streaming Over Wireless Network by CABAC Arithmetic Coding with Generalized FNT Transform

Ayad A. Abdulsalam

Share this Article



Top