Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Analysis of Access Control Methods in Cloud Computing

Version 1 : Received: 8 July 2016 / Approved: 8 July 2016 / Online: 8 July 2016 (10:12:21 CEST)

How to cite: Mulimani, M.; Rachh, R. Analysis of Access Control Methods in Cloud Computing. Preprints 2016, 2016070012. https://doi.org/10.20944/preprints201607.0012.v1 Mulimani, M.; Rachh, R. Analysis of Access Control Methods in Cloud Computing. Preprints 2016, 2016070012. https://doi.org/10.20944/preprints201607.0012.v1

Abstract

Cloud Computing is a promising and emerging technology that is rapidly being adopted by many IT companies due to a number of benefits that it provides, such as large storage space, low investment cost, virtualization, resource sharing, etc. Users are able to store a vast amount of data and information in the cloud and access it from anywhere, anytime on a pay-per-use basis. Since many users are able to share the data and the resources stored in the cloud, there arises a need to provide access to the data to only those users who are authorized to access it. This can be done through access control schemes which allow the authenticated and authorized users to access the data and deny access to unauthorized users. In this paper, a comprehensive review of all the existing access control schemes has been discussed along with analysis. Keywords: role-based access control, attribute-based access control, attribute-based encryption

Keywords

role-based access control; attribute-based access control; attribute-based encryption

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.