{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:29:53Z","timestamp":1703032193001},"reference-count":42,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,5]]},"abstract":"
Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.<\/p>","DOI":"10.4018\/ijcac.2022010104","type":"journal-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T16:44:25Z","timestamp":1636130665000},"page":"1-19","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Security-Based Access Control Models for Cloud Computing"],"prefix":"10.4018","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3994-8424","authenticated-orcid":true,"given":"Sandeep","family":"Choudhary","sequence":"first","affiliation":[{"name":"Ambedkar Institute of Advanced Communication Technologies and Research, India"}]},{"given":"Nanhay","family":"Singh","sequence":"additional","affiliation":[{"name":"Ambedkar Institute of Advanced Communication Technologies and Research, India"}]}],"member":"2432","reference":[{"key":"IJCAC.2022010104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.028"},{"key":"IJCAC.2022010104-1","unstructured":"Ajgaonkar, Indalkar, & Jeswani. (2015). Activity Based Access Control Model for Cloud Computing. International Journal of Current Engineering and Technology, 5(2)."},{"key":"IJCAC.2022010104-2"},{"key":"IJCAC.2022010104-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.037"},{"key":"IJCAC.2022010104-4","unstructured":"Ausanka-Crues. (2004). Methods for Access Control: Advances and Limitations. Academic Press."},{"key":"IJCAC.2022010104-5","doi-asserted-by":"crossref","unstructured":"Bell & LaPadula. (1976). Secure computer system: Unified exposition and multics interpretation. TR M74-244.","DOI":"10.21236\/ADA023588"},{"key":"IJCAC.2022010104-6","first-page":"321","article-title":"Ciphertext-policy attribute based encryption","author":"J.Bethencourt","year":"2007","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"IJCAC.2022010104-7","author":"R.Canetti","year":"2007","journal-title":"Chosen-ciphertext secure proxy reencryption. In CCS"},{"key":"IJCAC.2022010104-8","unstructured":"Chappell, D. (2008). Introducing the Azure Service Platform. White paper."},{"key":"IJCAC.2022010104-9","first-page":"559","article-title":"Access Control of Cloud Service Based on UCON","volume":"5931","author":"D.Chen","year":"2009","journal-title":"LNCS"},{"key":"IJCAC.2022010104-10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"IJCAC.2022010104-11","doi-asserted-by":"crossref","unstructured":"Choudhary & Singh. (2019). Safety Measures and Auto Detection against SQL Injection Attacks. International Journal of Engineering and Advanced Technology, 9(2), 2827 \u2013 2833.","DOI":"10.35940\/ijeat.B3316.129219"},{"key":"IJCAC.2022010104-12","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"IJCAC.2022010104-13","article-title":"Cloud security: Emerging threats and current solutions","author":"L.Coppolino","year":"2016","journal-title":"Computers & Electrical Engineering"},{"key":"IJCAC.2022010104-14","first-page":"554","article-title":"Role-Based Access Controls","author":"D. F.Ferraiolo","year":"1992","journal-title":"15th National Computer Security Conference"},{"key":"IJCAC.2022010104-15","unstructured":"Gartner. (2019, Apr. 2). Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17.5 Percent in 2019. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-04-02-gartner-forecasts-worldwide-public-cloud-revenue-to-g"},{"key":"IJCAC.2022010104-16"},{"key":"IJCAC.2022010104-17","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2019070103"},{"issue":"03","key":"IJCAC.2022010104-18","first-page":"1152","article-title":"Capability-based Cryptographic Data Access Control in Cloud Computing","volume":"03","author":"C.Hota","year":"2011","journal-title":"International Journal of Advanced Networking and Applications, Volume"},{"key":"IJCAC.2022010104-19","unstructured":"Karp, A., Haury, H., & Davis, M. (2009). From ABAC to ZBAC: the evolution of access control models. HP Laboratories-2009-30. Retrieved from, http:\/\/www.hpl.hp.com\/techreports\/2009\/HP L-2009-30.pdf?jumpid1\/4reg_R1002_USEN"},{"key":"IJCAC.2022010104-20","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2020010105"},{"issue":"5","key":"IJCAC.2022010104-21","first-page":"247","article-title":"Cloud Computing Security Issues and Challenges","volume":"3","author":"S. O.Kuyoro","year":"2011","journal-title":"International Journal of Computer Networks"},{"key":"IJCAC.2022010104-22","doi-asserted-by":"crossref","unstructured":"Liu, F., Tong, J., Mao, J., & Robert, B. (2011). NIST Cloud Computing Reference Architecture. U.S. Department of Commerce, NIST Special Publication 500-292.","DOI":"10.6028\/NIST.SP.500-292"},{"key":"IJCAC.2022010104-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.037"},{"key":"IJCAC.2022010104-24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.362"},{"key":"IJCAC.2022010104-25","doi-asserted-by":"crossref","unstructured":"Namasudra, Devi, Choudhary, Patan, & Kallam. (2018). Security, privacy, trust, and anonymity. Advances of DNA Computing in Cryptography, 138-150.","DOI":"10.1201\/9781351011419-7"},{"key":"IJCAC.2022010104-26","unstructured":"Networks, J. (2009). Identity Federation in a Hybrid Cloud Computing Environment Solution Guide. www.ictnetworks.com.au\/pdf\/ 8010035-en.pdf"},{"key":"IJCAC.2022010104-27","first-page":"441","article-title":"A cloud-oriented cross-domain security architecture","author":"T. D.Nguyen","year":"2010","journal-title":"Military Communications Conference"},{"key":"IJCAC.2022010104-28","first-page":"533","article-title":"Task\u2013role-based access control model","volume":"28","author":"S.Oh","year":"2003","journal-title":"Journal of Information Systems"},{"key":"IJCAC.2022010104-29","first-page":"127","article-title":"Building Dynamic Computing Infrastructures over Distributed Clouds","author":"P.Riteau","year":"2011","journal-title":"International Symposium on Network Cloud Computing and Applications"},{"key":"IJCAC.2022010104-30","doi-asserted-by":"crossref","unstructured":"Samarati, P., & de Vimercati, S. (2001). Access control: policies, models, and mechanisms. Foundations of Security Analysis and Design. Retrieved from, http:\/\/www.springerlink.com\/index\/80 wrewj7j1a716wb.pdf","DOI":"10.1007\/3-540-45608-2_3"},{"key":"IJCAC.2022010104-31","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2019010103"},{"key":"IJCAC.2022010104-32","doi-asserted-by":"publisher","DOI":"10.1109\/GUCON.2018.8675031"},{"key":"IJCAC.2022010104-33","first-page":"1","article-title":"A Purpose Based Usage Access Control Model","volume":"4","author":"L.Sun","year":"2010","journal-title":"International Journal of Computer and Information Engineering"},{"key":"IJCAC.2022010104-34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2011.247"},{"key":"IJCAC.2022010104-35","unstructured":"Whiteman & Mattord. (2012). Principles of Information Security (4th ed.). Cengage Learning."},{"key":"IJCAC.2022010104-36","first-page":"54","article-title":"A Gateway-based Access Control Scheme for Collaborative Clouds","author":"Y.Wu","year":"2012","journal-title":"7th International Conference on Internet Monitoring and Protection"},{"key":"IJCAC.2022010104-37","doi-asserted-by":"crossref","unstructured":"Younis, Kifayat, & Merabti. (2014). An access control model for cloud computing. Journal of Information Security and Applications, 19, 45-60.","DOI":"10.1016\/j.jisa.2014.04.003"},{"key":"IJCAC.2022010104-38","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738443"},{"key":"IJCAC.2022010104-39","doi-asserted-by":"crossref","unstructured":"Yu, Wang, Ren, & Lou. (2010). Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. Proc. IEEE INFOCOM 2010, 1-9.","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"IJCAC.2022010104-40","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"IJCAC.2022010104-41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195656"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=284495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T16:21:06Z","timestamp":1682698866000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2022010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2021,11,5]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/ijcac.2022010104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":["Computer Networks and Communications","Computer Science Applications","Human-Computer Interaction"],"published":{"date-parts":[[2021,11,5]]}}}