ANALYSIS IN CLOUD COMPUTING ACCESS CONTROL ISSUES
Abstract
Distributed computing is the utilization of registering assets like equipment and programming that are conveyed as an administration over a system. It trusts remote administrations with a client's information and programming, it empowers a client to do substantial measure of capacity, huge measure of calculations. Because of which information security in cloud turns into a major issue. Information get to control gives the security of information in the cloud. The vast measure of information outsourced in cloud servers, the information get to control turns into a testing issue in distributed storage frameworks. We have many access control security arrangements like Attribute based, Role based, Hierarchical character administration, Identity based validation, Trust based model and so on. Distributed computing is one late advancements. So it moves toward becoming exceptionally important to secure the information and also protection of clients. Access Control strategies give a compelling approach to guarantee that approved client's entrance the information and the framework. In this paper we talked about different highlights of quality based Encryption, Role based, Hierarchical personality administration, Identity based confirmation, Trust based model reasonable for distributed computing condition.
Keywords
References
DeepthiAdulapuram,” Hierarchical Attribute –Set-Based Encryption”,IRACST – International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555,Vol. 3, No.4, August 2013.
U Jyothi, Nagi Reddy, B Ravi Prasad, ”Review of “Achieving Secure,Scalable and Fine Grained data Access Control in Cloud Computing” International Journal Of Engineering And Computer Science ISSN:2319-7242,Volume 2 Issue 8 August, 2013 Page No. 2440-2447
Zhiguo Wan, Jun’e Liu, and Robert H. Deng,”HASBE: A Hierarchical Attribute Based Solution for Flexible and Scalbale Access Control in Cloud Computing” IEEE Transactions On Information Forensics and Security,Vol 7 , No 2, April 2012
Kan Yang, XiaohuaJia, Expressive, Efficient, and Revocable Data Access Control for Multi-Authority cloud Storage” IEEE Transactions on Parallel and Distributed Systems,Vol,25,No 7, July 2014.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.