Reference Hub5
Analysis of Security-Based Access Control Models for Cloud Computing

Analysis of Security-Based Access Control Models for Cloud Computing

Sandeep Choudhary, Nanhay Singh
Copyright: © 2022 |Volume: 12 |Issue: 1 |Pages: 19
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781683182535|DOI: 10.4018/IJCAC.2022010104
Cite Article Cite Article

MLA

Choudhary, Sandeep, and Nanhay Singh. "Analysis of Security-Based Access Control Models for Cloud Computing." IJCAC vol.12, no.1 2022: pp.1-19. http://doi.org/10.4018/IJCAC.2022010104

APA

Choudhary, S. & Singh, N. (2022). Analysis of Security-Based Access Control Models for Cloud Computing. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1-19. http://doi.org/10.4018/IJCAC.2022010104

Chicago

Choudhary, Sandeep, and Nanhay Singh. "Analysis of Security-Based Access Control Models for Cloud Computing," International Journal of Cloud Applications and Computing (IJCAC) 12, no.1: 1-19. http://doi.org/10.4018/IJCAC.2022010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.