Ubiquitous computing Data Security-A literature Survey

  • Yagnik Rathod
  • Chetan Kotwal
Keywords: Cloud computing, cloud security, access control in cloud

Abstract

Modern Era is having advance high level computing power with enhancement of Information Communications Technology (ICT) within last few decades. Such advancement makes computing utility most important and basic utility for human kind among all basic and necessary utilities. For routine human kind activities and for requirements of current world which is based on ICT, computing utility becomes primary needs. Computing utility in current era needs to be vision as fundament service as and when needed like all other utilities of humankind. To express this vision, many different ideas have been suggested in various literatures and most popular and accepted and admired model of computing is Cloud computing.ICT and computing power in synchronization with cloud computing can be utilize to create Smart Power Grids like concepts. Access to data and utility from anywhere as and when needed comes with many security threats. Threats can be from legitimate and illegitimate users and system must be safeguarded from all. In this paper, we tried to explain Cloud computing and how to make it possible to realize cloud and various access control mechanisms for securing cloud access.

References

Jayant, D..B. Swapnaja, A.U.& Subhash V.P. (2015). Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role based access control model, Journal international journal of computer applications (0975 – 8887) volume 118– no.12
Kalyani.,H. ,Rahul, P.,& Ambika, P. (2014). Achieve fine grained data access control in cloud computing using kp-abe along-with lazy and proxy re-encryption. International journal of emerging technology and advanced engineering volume 4, issue 2.
Lan, z. Vijay, V. & Michael, H. (2009). Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, vol. 8, no. 12.
Manachai, T, Abdunabi, R. Indrakshi, R.& Indrajit, R. (2012). A trust-based access control model for pervasive computing applications. U.S.airforce under contract fa 9550-07-1-0042
NIST Special Publication January 2014.Guide to Attribute Based Access Control (ABAC) Definition and considerations, 800- 162.
Prachi,S. (2013) Data security for cloud storage system using role based access control, International journal of science and research (ijsr) issn (online): 2319-7064
Ravi. S. S., & Edward, J. C. (1996), Role-Based Access Control Models. IEEE Computer, Volume 29, Number 2, 38-47
Ravi. S. S., & Samarati, P. (1994). Access Control: Principals and practice IEEE Communications magazines 32(9):40 - 48.
Sathya Preiya,V.,Pavithra,R. & Dr. Joshi (2011). Secure role based data access control in cloud computing. International journal of computer trends and technology. May to June issue.
Sudip, C. & Indrajit, R.(2006), Trusbac integrating trust relationships into the RBAC model for access control in open systems, sacmat’06 california, usa.
Sushmita,R. (2014), Attribute Based Access Control in Clouds Performance A Survey, IEEE conference SPCOM.
Published
2018-10-05