Profile Based Access Control Model in Cloud Computing Environment

被引:0
|
作者
Namasudra, Suyel [1 ]
Nath, Samir [1 ]
Majumder, Abhishek [1 ]
机构
[1] Tripura Univ, Dept Comp Sci & Engn, Suryamaninagar, Tripura West, India
关键词
Access control models; Cloud Service Provider; Data Owner; Profile Based Access Control Model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is now a day a very lucrative technology due to its efficiency, cost effectiveness, flexibility, scalability and pay-per-use. But with these advantages many new problems have been introduced and some existing problems have become so much critical. One of the existing problems that have become critical in cloud environment is access control. Access control is a procedure that allows a user to access data or file from system. There are several access policies which have to be followed by the users for accessing any kind of data from a server. In cloud environment there are many access control models. In this paper a new access control model namely Profile Based Access Control Model (PrBAC) has been proposed. There are several problems for accessing data like high access time, high searching cost and problem of data redundancy. Another problem of access control models is that the Data Owner (DO) must be always online when user wants to access data from cloud server. By PrBAC all these problems are minimized.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [2] Secure DNA and Morse code based Profile access control models for Cloud Computing Environment
    Yadav, Monika
    Breja, Manvi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2590 - 2598
  • [3] Access control based resource allocation in cloud computing environment
    [J]. Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19):
  • [4] System security model based on trusted access control under cloud computing environment
    [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10):
  • [5] Time efficient secure DNA based access control model for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    Vijayakumar, Pandi
    Audithan, Sivaraman
    Balusamy, Balamurugan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 90 - 105
  • [6] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [7] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [8] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [9] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [10] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203