ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review of Cloud Service Security with Various Access Control Methods

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 3)

Publication Date:

Authors : ; ;

Page : 39-45

Keywords : Access control methods; MAC; DAC; ABAC; RBAC; Risk based access control;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing is the use of computing resources like hardware and software that are delivered as a service over a network. It confides remote services with a user's data and software. It enables a user to do large amount of storage and large amount of computations. Due to which data security in cloud becomes an important issue. Data access control provides the security of data in the cloud. The large amount of data outsourced in cloud servers. The data access control becomes a challenging issue in cloud storage systems. Basic models includes DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role based access control), task based access control (TBAC) and ABAC (Attribute Based Access Control) model. Risk based access control method is also used in multilevel organization. Security of data as well as services & privacy of users are important in cloud computing environment. Access Control methods provide an effective way to ensure that authorized user's access the data and the system. In this paper we have discussed various features of access control methods for cloud computing environment.

Last modified: 2021-04-01 04:14:36