A Review of Cloud Service Security with Various Access Control Methods
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 3)Publication Date: 2021-03-30
Authors : Shakti Dubey; P. K. Rai;
Page : 39-45
Keywords : Access control methods; MAC; DAC; ABAC; RBAC; Risk based access control;
Abstract
Cloud computing is the use of computing resources like hardware and software that are delivered as a service over a network. It confides remote services with a user's data and software. It enables a user to do large amount of storage and large amount of computations. Due to which data security in cloud becomes an important issue. Data access control provides the security of data in the cloud. The large amount of data outsourced in cloud servers. The data access control becomes a challenging issue in cloud storage systems. Basic models includes DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role based access control), task based access control (TBAC) and ABAC (Attribute Based Access Control) model. Risk based access control method is also used in multilevel organization. Security of data as well as services & privacy of users are important in cloud computing environment. Access Control methods provide an effective way to ensure that authorized user's access the data and the system. In this paper we have discussed various features of access control methods for cloud computing environment.
Other Latest Articles
- Message (Text) Extraction System from Noisy-Image Regions Using Morphological Dialation Technique in Forensics Investigation
- Changing Trends of Advertisements
- Social Security, Citizenship and Restructuring of Nigeria
- Recruitment and Selection Methods Used in Private Sector: With Special Reference to Aurangabad District
- SYNDROME DOGILVIE EN POST-OPERATOIRE DUNE CESARIENNE A PROPOS DUN CAS
Last modified: 2021-04-01 04:14:36