Secure Cloud Storage with Access Control: A Survey
P. Ranjima1 , Sumathi. D2 , M. Mathew3 , P. Sivaprakash4
Section:Survey Paper, Product Type: Journal Paper
Volume-2 ,
Issue-8 , Page no. 124-126, Aug-2014
Online published on Aug 31, 2014
Copyright © P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, “Secure Cloud Storage with Access Control: A Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.124-126, 2014.
MLA Style Citation: P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash "Secure Cloud Storage with Access Control: A Survey." International Journal of Computer Sciences and Engineering 2.8 (2014): 124-126.
APA Style Citation: P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, (2014). Secure Cloud Storage with Access Control: A Survey. International Journal of Computer Sciences and Engineering, 2(8), 124-126.
BibTex Style Citation:
@article{Ranjima_2014,
author = {P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash},
title = {Secure Cloud Storage with Access Control: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {124-126},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=241},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=241
TI - Secure Cloud Storage with Access Control: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 124-126
IS - 8
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3525 | 3485 downloads | 3606 downloads |
Abstract
Cloud computing is a technique used to refer web based services and development. It is a ubiquitous services, means anyone can access from anywhere in the world at anytime. It provides application, platform and resources to the user. It is a virtualized pool of resources. These services are provided by CSP. The main features of cloud are flexibility, elasticity, on-demand services, metered services, etc. Some large companies offer data storage spaces which are leased to others. So the devices connected to internet can achieve these services. Cloud stores data in database and replicated in different virtual machines, that can be placed anywhere in world. This may leads to some major security issues in cloud storage and retrieval. In order to prevent unauthorized access, access control techniques can be used. A user authentication verifies identity of user. While providing services; we are concern about security and privacy of the information. This survey paper introduces a detailed analysis of security and privacy preserving techniques, and a comparison among various access control mechanism.
Key-Words / Index Term
Cloud computing; Security; Attribute Based Encryption; Authentication; Access control
References
[1].Sushmita Ruj, Milos Stojmenovic et al.,�Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds�, in IEEE transactions VOL:25 NO:2 2014.
[2].S. Ruj, A. Nayak, and I. Stojmenovic,�DACC: Distributed access control in clouds,� in IEEE TrustCom, 201 1.
[3].Kan Yang, Xiaohua Jia and Kui Ren,�DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems�,IACR Cryptology ePrint Archive,419,2012.
[4]www.tcs.com/SiteCollectionDocuments/White%20Papers/HighTech_Whitepaper_Windows_Azure_09_2011.pdf
[5] http://www.w3.org/TR/2007/WD-access-control-20071001/
[6] S.Yu,C.Wang,K.Ren, and W.Lou,�Attribute based data sharing with attribute revocation,� in ACM ASIACCS, pp. 261�270, 2010.
[7] W.Wang,Z.Li,R.Owens,and B.Bhargava, �Secure and efficient access to outsourced data,� in ACM Cloud Computing Security Workshop ,2009.
[8] www.iosrjournals.org/iosr-jce/papers/Vol9-Issue2/E0922831.pdf
[9] mslab.kaist.ac.kr/twiki/pub/ContentNetworking/WebHome/L26_AC_DRM.pptx
[10] http://psrcentre.org/images/extraimages/1112106.pdf
[11] Seny Kamara, Kristin Lauter, �Cryptographic cloud storage�, Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136-149, vol. 6054, 2010.
[12] Kuyoro S. O., Ibikunle F. & Awodele O, �Cloud Computing Security Issues and Challenges,� in IJCN, Vol 3 :Issue (5) : 2011
[13] Abhinay B.Angadi, Akshata B.Angadi, et al., �Security Issues with Possible Solutions in Cloud Computing-A Survey,� in IJARCET, Vol 2, Issue 2, Feb 2013.
[14] Ritesh G. Anantwar, Dr. P.N. Chatur, et al., �Cloud Computing and Security Models: A Survey,� in IJESIT,Vol 1, Issue 2, Nov 2012
[15] Torry Harris, �CLOUD COMPUTING � An Overview,�
[16] http://www.slideshare.net/dattudharanikota/cloud-computing-ppt-14857120
[17] http://en.wikipedia.org/wiki/Cloud_computing