Secure Cloud Storage with Access Control: A Survey
Keywords:
Cloud computing, Security, Attribute Based Encryption, Authentication, Access controlAbstract
Cloud computing is a technique used to refer web based services and development. It is a ubiquitous services, means anyone can access from anywhere in the world at anytime. It provides application, platform and resources to the user. It is a virtualized pool of resources. These services are provided by CSP. The main features of cloud are flexibility, elasticity, on-demand services, metered services, etc. Some large companies offer data storage spaces which are leased to others. So the devices connected to internet can achieve these services. Cloud stores data in database and replicated in different virtual machines, that can be placed anywhere in world. This may leads to some major security issues in cloud storage and retrieval. In order to prevent unauthorized access, access control techniques can be used. A user authentication verifies identity of user. While providing services; we are concern about security and privacy of the information. This survey paper introduces a detailed analysis of security and privacy preserving techniques, and a comparison among various access control mechanism.
References
Sushmita Ruj, Milos Stojmenovic et al.,"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds", in IEEE transactions VOL:25 NO:2 2014.
S. Ruj, A. Nayak, and I. Stojmenovic,"DACC: Distributed access control in clouds," in IEEE TrustCom, 201 1.
Kan Yang, Xiaohua Jia and Kui Ren,"DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems",IACR Cryptology ePrint Archive,419,2012.
www.tcs.com/SiteCollectionDocuments/White%20Papers/HighTech_Whitepaper_Windows_Azure_09_2011.pdf
http://www.w3.org/TR/2007/WD-access-control-20071001/
S.Yu,C.Wang,K.Ren, and W.Lou,"Attribute based data sharing with attribute revocation," in ACM ASIACCS, pp. 261"270, 2010.
W.Wang,Z.Li,R.Owens,and B.Bhargava, "Secure and efficient access to outsourced data," in ACM Cloud Computing Security Workshop ,2009.
www.iosrjournals.org/iosr-jce/papers/Vol9-Issue2/E0922831.pdf
mslab.kaist.ac.kr/twiki/pub/ContentNetworking/WebHome/L26_AC_DRM.pptx
http://psrcentre.org/images/extraimages/1112106.pdf
Seny Kamara, Kristin Lauter, "Cryptographic cloud storage", Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136-149, vol. 6054, 2010.
Kuyoro S. O., Ibikunle F. & Awodele O, "Cloud Computing Security Issues and Challenges," in IJCN, Vol 3 :Issue (5) : 2011
Abhinay B.Angadi, Akshata B.Angadi, et al., "Security Issues with Possible Solutions in Cloud Computing-A Survey," in IJARCET, Vol 2, Issue 2, Feb 2013.
Ritesh G. Anantwar, Dr. P.N. Chatur, et al., "Cloud Computing and Security Models: A Survey," in IJESIT,Vol 1, Issue 2, Nov 2012
Torry Harris, "CLOUD COMPUTING " An Overview,"
http://www.slideshare.net/dattudharanikota/cloud-computing-ppt-14857120
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
