Survey of Centralized and Decentralized Access Control Models in Cloud Computing

نویسندگان

چکیده

In recent years, cloud computing has become a popular option for number of different businesses sectors. It is paradigm employed to deliver range services, such as sharing resources via the Internet. Security issues in necessitates need mechanism keep system safe and reliable. An access control one that permits or denies services. This paper presents survey models Cloud Computing. Several existing surveys on mechanisms mainly focused traditional encryption-based while others applying blockchain technology control. However, possess characteristics, system’s reliance centralized trusted administrator manage policy adopting decentralized approach. reviews analyses computing, based models, provides detailed comparisons each model’s advantages limitations, discusses challenges of, future research direction

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Access Control Models for Cloud Computing

The relationship between users and resources is dynamic in the cloud, and service providers and users are typically not in the same security domain. Identity-based security (e.g., discretionary or mandatory access control models) cannot be used in an open cloud computing environment, where each resource node may not be familiar, or even do not know each other. Users are normally identified by t...

متن کامل

Access Control in Cloud Computing Environment

Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods ensure that authorized user’s access the data and the system. This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment. It leads...

متن کامل

Policy-based Access Control in Cloud Computing

Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User of the cloud outsourced their sensitive data and information to cloud provider’s...

متن کامل

Survey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud

This Paper new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the scheme the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. In this study scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. It’s prevents r...

متن کامل

A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation

A Secure cloud computing is been proposed using access control which is attribute based encryption along with unspecified authentication of the user from security point of view and user revocation. In proposed system two key distribution centers are used and number of KDC can be increased depending on how many users are there. Decentralized approach is used in this paper as this approach proves...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2021

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2021.0120243