Secure Cloud Storage with Access Control: A Survey

Authors

  • Ms. P Ranjima Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Ms. D Sumathi Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Ms.Minimol Mathew Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Mr.P Sivaprakash Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu

Keywords:

Cloud computing, Security, Attribute Based Encryption, Authentication, Access control

Abstract

Cloud computing is a technique used to refer web based services and development. It is a ubiquitous services, means anyone can access from anywhere in the world at anytime. It provides application, platform and resources to the user. It is a virtualized pool of resources. These services are provided by CSP. The main features of cloud are flexibility, elasticity, on-demand services, metered services, etc. Some large companies offer data storage spaces which are leased to others. So the devices connected to internet can achieve these services. Cloud stores data in database and replicated in different virtual machines, that can be placed anywhere in world. This may leads to some major security issues in cloud storage and retrieval. In order to prevent unauthorized access, access control techniques can be used. A user authentication verifies identity of user. While providing services; we are concern about security and privacy of the information. This survey paper introduces a detailed analysis of security and privacy preserving techniques, and a comparison among various access control mechanism.

References

Sushmita Ruj, Milos Stojmenovic et al.,"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds", in IEEE transactions VOL:25 NO:2 2014.

S. Ruj, A. Nayak, and I. Stojmenovic,"DACC: Distributed access control in clouds," in IEEE TrustCom, 201 1.

Kan Yang, Xiaohua Jia and Kui Ren,"DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems",IACR Cryptology ePrint Archive,419,2012.

www.tcs.com/SiteCollectionDocuments/White%20Papers/HighTech_Whitepaper_Windows_Azure_09_2011.pdf

http://www.w3.org/TR/2007/WD-access-control-20071001/

S.Yu,C.Wang,K.Ren, and W.Lou,"Attribute based data sharing with attribute revocation," in ACM ASIACCS, pp. 261"270, 2010.

W.Wang,Z.Li,R.Owens,and B.Bhargava, "Secure and efficient access to outsourced data," in ACM Cloud Computing Security Workshop ,2009.

www.iosrjournals.org/iosr-jce/papers/Vol9-Issue2/E0922831.pdf

mslab.kaist.ac.kr/twiki/pub/ContentNetworking/WebHome/L26_AC_DRM.pptx

http://psrcentre.org/images/extraimages/1112106.pdf

Seny Kamara, Kristin Lauter, "Cryptographic cloud storage", Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136-149, vol. 6054, 2010.

Kuyoro S. O., Ibikunle F. & Awodele O, "Cloud Computing Security Issues and Challenges," in IJCN, Vol 3 :Issue (5) : 2011

Abhinay B.Angadi, Akshata B.Angadi, et al., "Security Issues with Possible Solutions in Cloud Computing-A Survey," in IJARCET, Vol 2, Issue 2, Feb 2013.

Ritesh G. Anantwar, Dr. P.N. Chatur, et al., "Cloud Computing and Security Models: A Survey," in IJESIT,Vol 1, Issue 2, Nov 2012

Torry Harris, "CLOUD COMPUTING " An Overview,"

http://www.slideshare.net/dattudharanikota/cloud-computing-ppt-14857120

http://en.wikipedia.org/wiki/Cloud_computing

Downloads

Published

2014-08-30

How to Cite

[1]
M. P. Ranjima, M. D. Sumathi, M. Mathew, and M. Sivaprakash, “Secure Cloud Storage with Access Control: A Survey”, Int. J. Comp. Sci. Eng., vol. 2, no. 8, pp. 124–126, Aug. 2014.

Issue

Section

Survey Article