Abstract

Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.

Highlights

  • Cloud computing comes with many features such as flexibility, elasticity, scalability, universal access, economic etc

  • The PAR-AC is using the combination of Attribute based access control (ABAC) and Hierarchical Role Based Access Control (RBAC) methods; as a result we got a fine grained access control method

  • PAR-AC is having all basic features of cloud based access control methods as AC3[27] and HA-RAC [7]

Read more

Summary

Introduction

Cloud computing comes with many features such as flexibility, elasticity, scalability, universal access, economic etc. In order to protect the data and to maintain trustworthiness in the cloud environment, an efficient access control mechanism should be deployed [8][9].Some traditional access control methods are User based access control method (UBAC), Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC) [10] [11] [12] [13]. A hybrid approach is proposed, which combine ABAC with RBAC with defined hierarchy [7] This model does not solve the problem of back up of data. This paper considers the problem of back up of data, unlimited access of data, linking of authentication with authorization, security of stored data and proposes a new novel access control method

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call