Ubiquitous computing Data Security-A literature Survey
Modern Era is having advance high level computing power with enhancement of Information Communications Technology (ICT) within last few decades. Such advancement makes computing utility most important and basic utility for human kind among all basic and necessary utilities. For routine human kind activities and for requirements of current world which is based on ICT, computing utility becomes primary needs. Computing utility in current era needs to be vision as fundament service as and when needed like all other utilities of humankind. To express this vision, many different ideas have been suggested in various literatures and most popular and accepted and admired model of computing is Cloud computing.ICT and computing power in synchronization with cloud computing can be utilize to create Smart Power Grids like concepts. Access to data and utility from anywhere as and when needed comes with many security threats. Threats can be from legitimate and illegitimate users and system must be safeguarded from all. In this paper, we tried to explain Cloud computing and how to make it possible to realize cloud and various access control mechanisms for securing cloud access.
Kalyani.,H. ,Rahul, P.,& Ambika, P. (2014). Achieve fine grained data access control in cloud computing using kp-abe along-with lazy and proxy re-encryption. International journal of emerging technology and advanced engineering volume 4, issue 2.
Lan, z. Vijay, V. & Michael, H. (2009). Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, vol. 8, no. 12.
Manachai, T, Abdunabi, R. Indrakshi, R.& Indrajit, R. (2012). A trust-based access control model for pervasive computing applications. U.S.airforce under contract fa 9550-07-1-0042
NIST Special Publication January 2014.Guide to Attribute Based Access Control (ABAC) Definition and considerations, 800- 162.
Prachi,S. (2013) Data security for cloud storage system using role based access control, International journal of science and research (ijsr) issn (online): 2319-7064
Ravi. S. S., & Edward, J. C. (1996), Role-Based Access Control Models. IEEE Computer, Volume 29, Number 2, 38-47
Ravi. S. S., & Samarati, P. (1994). Access Control: Principals and practice IEEE Communications magazines 32(9):40 - 48.
Sathya Preiya,V.,Pavithra,R. & Dr. Joshi (2011). Secure role based data access control in cloud computing. International journal of computer trends and technology. May to June issue.
Sudip, C. & Indrajit, R.(2006), Trusbac integrating trust relationships into the RBAC model for access control in open systems, sacmat’06 california, usa.
Sushmita,R. (2014), Attribute Based Access Control in Clouds Performance A Survey, IEEE conference SPCOM.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in International Journal of Innovative Knowledge Concepts are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.