A Comparision of Access Control Schemes for Cloud Data Privacy

Authors

  • Farooqui UK
  • Bharti AK

DOI:

https://doi.org/10.26438/ijcse/v6i10.392395

Keywords:

Cloud Computin, privacy preservation, Fine Grained

Abstract

Cloud deliver awesome comfort to its users as the user experience cloud services without having own hardware infrastructure. Now a day’s cloud services have important role on the internet as most of the services used by us are either cloud based or likely to be migrated in to cloud. The open architecture of cloud invites various security and vulnerability issues. The user data are outsourced and there is no strong privacy present between the user and cloud server because cloud uses third party intervention (which generally access the user data and auditing them). Outsourcing cloud data leads various vulnerability and privacy issues. Many researchers proposed different technique to address privacy preservation in the cloud computing, but still they are not 100% succeeded, some of them works on fine grained access control and some advocated attribute base access control scheme. In this paper, we made an attempt to compare two renowned privacy preservation schemes based on Fine Grained and Attribute based access control mechanism

References

[1] M.Thangavel,S.Sridhar, “An Analysis of privacy preservation schemes in cloud computing”,2nd IEEE International Conferenceon Engineering & Technology ,March 2016.

[2] J. K. Liu, M. H. Au, X. Huang, R. Lu, J. Li, “Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services,”, Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 484-497, March, 2016.

[3] Umar Khalid Farooqui,P.K.Bharti ,et . al. “A Review: privacy preservation in Cloud Environment issues and challenges”,IJRASET Volume 5 Issue VIII ,2017

[4] M. Thangavel, P. Varalakshmi, S. Sridhar, “An Analysis of Privacy Preservation Schemes in Cloud Computing”, 2nd IEEE International Conference on Engineering and Technology (ICETECH), 17th & 18th March 2016, Coimbatore, TN, India.

[5] H. Liu, H. Ning, Q. Xiong, L.T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing,” Transactions on Parallel and Distributed Systems, Vol. 26, No. 1, pp241-251, January, 2015.

[6] Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member, IEEE, and Laurence T. Yang, Member, IEEE “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing” , IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 1, JANUARY 2015.

[7] Sun, Yunchuan, et al. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks (2014).

[8] L.A. Dunning, R. Kresman, “Privacy Preserving Data Sharing WithAnonymous ID Assignment”, Transaction on Information Forensics and Security, IEEE, Vol. 8, No. 2, pp. 402-413, February, 2013.

[9] P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” Nat’l Inst. of Standards and Technology, 2009.

[10] M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-TAA,” in Proc. 5th Int. Conf. SCN, 2006, pp. 111–125.

[11] J. Camenisch and A. Lysyanskaya, “Signature schemes and anonymous credentials from bilinear maps,” in Advances in Cryptology. Berlin,Germany: Springer-Verlag, 2004, pp. 56–72.

[12] J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” in Proc. 3rd Int. Conf. Secur. Commun. Netw. (SCN), Amalfi,Italy, Sep. 2002, pp. 268–289.

[13] R. Canetti, “Universally Composable Security: A New Paradigm for Cryptographic Protocols,” Proc. 42nd IEEE Symp. Foundations of Computer Science (FOCS ’01), pp. 136-145, Oct. 2001.

[14] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,”in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004,pp. 41–55.

[15] H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures,” in Topics in Cryptology, vol. 6558. Berlin, Germany: Springer-Verlag, 2011, pp. 376–392.

[16] D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control ofsecurity capabilities,” ACM Trans. Internet Technol., vol. 4,no. 1, pp. 60–82,

[17] A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Proc. WPES, 2005, pp. 61–70. 2004.

[18] T. Okamoto, “Receipt-free electronic voting schemes for large scale elections,” in Proc. 5th Int. Workshop Secur. Protocols, 1997, pp. 25–35.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.392395
Published: 2025-11-17

How to Cite

[1]
U. K. Farooqui and A. K. Bharti, “A Comparision of Access Control Schemes for Cloud Data Privacy”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 392–395, Nov. 2025.

Issue

Section

Research Article