PpBAC: Popularity Based Access Control Model for Cloud Computing

被引:76
|
作者
Namasudra, Suyel [1 ]
Roy, Pinki [2 ]
机构
[1] Galgotias Univ, Greater Noida, Uttar Pradesh, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Silchar, India
关键词
Cloud Service Provider; Data Owner; Decryption; Encryption; Popularity Value; PROTOCOL; SECURITY;
D O I
10.4018/JOEUC.2018100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.
引用
收藏
页码:14 / 31
页数:18
相关论文
共 50 条
  • [1] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [2] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [3] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [4] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [5] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    [J]. ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [6] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [7] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    [J]. INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [8] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [9] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [10] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    [J]. CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162