A Review of fine grained access control techniques

  • Authors

    • Rakesh Shirsath
    • Dr K. V. Daya Sagar
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10249
  • Attribute based encryption, Cipher text policy, Cloud Computing, Key policy, Hierarchical-ASBE, Security
  • Nowadays cloud computing is most demanding technology where computing resources are availed as per demand through Internet. Cloud computing model also brings many challenges for confidentiality, integrity, privacy of data and data access control. As cloud computing develops vigorously, an increasing number of enterprises and individuals are motivated to upload their data sources to the public cloud server for sharing. It is not entirely credible for enterprises and individuals to transfer data owing to the openness of the cloud server, so they must encrypt data before uploading and also loose direct control of data. Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem. In this paper, the issue of access control is discussed by defining traditional access policies. Attribute based access policy is analysed with its types. Finally, comparison is made among all policies with respect to various parameters.

  • References

    1. [1] Yunchuan Sun, Junsheng Zhang, YongpingXiong, and Guangyu Zhu, “Review Article Data Security and privacy in Cloud Computing,†International Journal of Distributed Sensor Networks, Volume: 10 Issue: 7, 2014.

      [2] Priya G, Kavitha BR, Ramya G, Kumaresan P, Feslin Anish Mon, “An Access Control Models in Cloud Computing: A Reviewâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 24, 539-548, 2017.

      [3] Meghanathan, Natarajan, “Review of Access Control Models for Cloud Computingâ€, Computer Science & Information Technology. 3. 77-85, 2013.

      [4] Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, and Jin Li, “Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Servicesâ€, IEEE Transactions on Information Forensics and Security, Vol. 11, No. 3, March 2016.

      [5] Erkan Yalcinkaya, Antonio Maffei and Mauro Onori, “Application of Attribute Based Access Control Model for Industrial Control Systems†I. J. Computer Network and Information Security, 2017, 2, 12-21.

      [6] Jun Shao, Rongxing Lu and XiaodongLin,"Fine-Grained Data Sharing in Cloud Computing for Mobile Devices",Institute of Electrical and Electronics Engineers (IEEE),2015.

      [7] Jiaye Shao, Yanqin Zhu, Qijin Ji, "Privacy-Preserving Online/Offline and Outsourced Multi-Authority Attribute-Based Encryption",Institute of Electrical and Electronics Engineers (IEEE),2017.

      [8] Etti Mathur, Manish Sharma, “A Review of Attribute based Encryption Technique for Security in Cloud Computingâ€, International Journal of Computer Applications, Volume 159 – No 3, February 2017

      [9] B Sankaraiah, D. Bhadru, G Shravan Kumar, “A Review on Different Access Control Mechanism in Cloud Environmentâ€, SSRG International Journal of Computer Science and Engineering, Special Issue, April 2017.

      [10] Guofeng Lin, Hanshu Hong, and Zhixin Sun, “A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharingâ€, IEEE, pp. 9464 – 9475, 2017.

      [11] Parmar Vipul Kumar J, RajaniKanthAluvalu, “Key Policy Attribute Based Encryption (KP-ABE): A Reviewâ€, International Journal of Innovative and Emerging Research in Engineering, Volume 2, Issue 2, 2015.

      [12] Changji Wang1,2,3 and Jianfa Luo1,2 “An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length†Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013.

      [13] John Bethencourt, Amit Sahai, Brent Waters “Ciphertext-Policy Attribute-Based Encryption†Supported the US Army Research Office under the CyberTA Grant No. W911NF-06-1-0316.

      [14] Guojun Wang, Qin Liu, Jie Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Servicesâ€, 17th ACM conference on Computer and communications security, Pages 735-737, 2010.

      [15] Shashikant Govind Vaidya, Shailesh KisanHule, Gaurav BalvantDagade, Sharad Arjun Jadhav, “HABE (Hierarchical Attribute Based Encryption) Model for Supporting Dynamic structure of organizationâ€, Second International Conference on Advances in Computing, Control and Communication (CCN), 2012.

      [16] Guojun Wang, Qin Liu, Jie Wu, Minyi Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud serversâ€, Computers & Security, Vol:30, Issue:5, Page:320-331,2011.

  • Downloads

  • How to Cite

    Shirsath, R., & K. V. Daya Sagar, D. (2018). A Review of fine grained access control techniques. International Journal of Engineering & Technology, 7(2.7), 20-24. https://doi.org/10.14419/ijet.v7i2.7.10249