Data Access Control on Clouds

Article Preview

Abstract:

As the cloud computing is becoming increasingly popular, more enterprise and individuals tend to use cloud to store data. As a convenient way of data storage, however, the network security became the greatest concern to all kinds of users. In terms of the security problem, three different approaches are introduced to deal with this problem in this paper. And the performance, load and security of these data access control methods will be discussed in detailed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6275-6280

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Hummen, R., Henze, M., Catrein, D., & Wehrle, K. (2012, December). A Cloud design for user-controlled storage and processing of sensor data. In Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on (pp.232-240.

DOI: 10.1109/cloudcom.2012.6427523

Google Scholar

[2] Mon, E. E., & Naing, T. T. (2011, October). The privacy-aware access control system using attribute-and role-based access control in private cloud. InBroadband Network and Multimedia Technology (IC-BNMT), 2011 4th IEEE International Conference on (pp.447-451.

DOI: 10.1109/icbnmt.2011.6155974

Google Scholar

[3] Yang, K., Jia, X., & Ren, K. (2012). DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. IACR Cryptology ePrint Archive, 2012, 419.

DOI: 10.1109/infcom.2013.6567100

Google Scholar

[4] Nabeel, M., & Bertino, E. (2013). Privacy Preserving Delegated Access Control in Public Clouds.

Google Scholar

[5] Masood, R., & Shibli, M. A. (2012, August). Comparative Analysis of Access Control Systems on Cloud. In Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD), 2012 13th ACIS International Conference on (pp.41-46.

DOI: 10.1109/snpd.2012.33

Google Scholar

[6] Nabeel, M., Bertino, E., Kantarcioglu, M., & Thuraisingham, B. (2011, October). Towards privacy preserving access control in the cloud. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on (pp.172-180.

DOI: 10.4108/icst.collaboratecom.2011.247061

Google Scholar

[7] Lu, Y., Zhang, J., Wu, S., & Zhang, S. (2012, August). A Hybrid Dynamic Load Balancing Approach for Cloud Storage. In Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on (pp.1332-1335). IEEE.

DOI: 10.1109/icicee.2012.353

Google Scholar

[8] C. C., & Naing, T. T. (2011, September). The efficient data storage management system on cluster-based private cloud data center. In Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on (pp.235-239). IEEE.

DOI: 10.1109/ccis.2011.6045066

Google Scholar

[9] Itani, W., Kayssi, A., & Chehab, A. (2009, December). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. InDependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on (pp.711-716.

DOI: 10.1109/dasc.2009.139

Google Scholar

[10] Beaty, K., Kundu, A., Naik, V., & Acharya, A. (2013). Network-level Access Control Management for the Cloud.

DOI: 10.1109/ic2e.2013.18

Google Scholar