Submit Search
Upload
IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions
•
0 likes
•
32 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I51128.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
J3602068071
J3602068071
ijceronline
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
Introduction to cloud security
Introduction to cloud security
IAEME Publication
Recommended
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
J3602068071
J3602068071
ijceronline
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
Introduction to cloud security
Introduction to cloud security
IAEME Publication
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
70 74
70 74
Editor IJARCET
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
G033030035
G033030035
ijceronline
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
More Related Content
What's hot
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
70 74
70 74
Editor IJARCET
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
G033030035
G033030035
ijceronline
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
What's hot
(20)
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
70 74
70 74
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
G033030035
G033030035
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
Similar to IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
James Heller
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
IRJET Journal
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Secure Cloud Computing
Secure Cloud Computing
IRJET Journal
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
Similar to IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions
(20)
An Analysis of Cloud Security
An Analysis of Cloud Security
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
How secured and safe is Cloud?
How secured and safe is Cloud?
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Secure Cloud Computing
Secure Cloud Computing
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
josephjonse
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
DrAjayKumarYadav4
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Employee leave management system project.
Employee leave management system project.
Kamal Acharya
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
ssuserdfc773
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
kalpana413121
Post office management system project ..pdf
Post office management system project ..pdf
Kamal Acharya
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
subhasishdas79
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
ChandrakantDivate1
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
ppkakm
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Kamal Acharya
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
sarkmank1
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
Mustafa Ahmed
Recently uploaded
(20)
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Employee leave management system project.
Employee leave management system project.
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
Post office management system project ..pdf
Post office management system project ..pdf
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Online electricity billing project report..pdf
Online electricity billing project report..pdf
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7732 Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions Prof. Rohini S. Pawar1, Prof. Sairabi H. Mujawar2 1Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. 2Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Now a day’s all users to used latest technology and currently most popular cloud based system or technique. But in this technique is very useful and fast. What about the security and its major problems. In this paper we discusses about pros and cons. The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis. Key words: Security; privacy, Access Controls, cloud computing; risk access control; authentication. 1. INTRODUCTION There has been a growing trend to store data in the cloud with the dramatic increase in the amount of digital information such as consumer’s personal data to larger enterprises. They want to back up databases or store archival data. Cloud data storage can be attractive for users (individuals or enterprises) because it provides unpredictable storage demands,requiringcheapstorage tier or a low cost and long-term archive. Service providers can focus more on the design of functions for enhance user experience of their services without worrying about resources to store the growing amount of data by outsourcing clients data to the cloud. Cloud can provide on demand resources so it can help service providers to decrease their maintenance costs. Besides,cloudstoragecan give a flexible and convenient way for users to access their data from anywhere on any device or gadget. There are distinctive sorts of infrastructures associatedwitha cloud.A public cloud is a cloud which is made accessible to the general public and also resources are allocated in a pay-as- you-go manner. A private cloud is an internal cloud that is built and operated by a single organization or association. The organization has full control on the private cloud. The private cloud cannot be accessed by external parties. Thus a private cloud is frequently consideredtobemoresecureand trusted. 1.1 Related Work Now a day, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute- based signature, attribute-based signcryption (ABSC) can provide con_dentiality and an anonymousauthentication for sensitive data and is more ef_cientthantraditional ``encrypt- then-sign'' or ``sign-then-encrypt'' strategies. Thus, ABSC is Suitable for _ne-grained access control in a semi-trusted cloud environment and is gaining more and more attention in recent years. 1.2 Problems and Solutions. Table- 1: SECURITY ISSUE AND EXISTING SOLUTION IN CLOUD COMPUTING Author Security Issues Existing Solution Subashini and Kavitha confidentiality and data access. virtualization. authentication and identity management. Service Level Agreement (SLA). framework. and access control. Zissis and Lekkas privacy. management. framework. cryptography encryption. control.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7733 Shahzad (DoS). security. Integrity,confidential ity and data availability. control. management. authentication. Y. Liu et al. control. virtualization. control. management. Suzic et al. management. trust. control. cryptography for encryption. Hepsiba and J.G.R. Sathiasee-lan (DoS). confidentiality and data availability. and access control. information security. protocol. In addition, the level of privacy in the cloud environment could help to preservetheconfidentialityofthe data while protecting user identity. Whereas, level of reliability relies on effective cloudmanagement byproviding storage and communications to cater user needs. Thus, the level of privacy and reliability are the dependent factor to support the development of cloud technology in an organization. Fig- 1: Adaptation of Cloud Computing Architecture Cloud computing is the internet-based technology that includes a storage service and communication, efficient resource management and incurs minimal cost. In addition, cloud computing imposed on virtualization technology in providing computing resourcesbasedonuser’srequirement [19]. Based on standard definition by National Institute of Standards and Technology (NIST), cloud computing is a model that allows network accesstoresourcesonconfigured computing (network, servers, applications, storage hub and services) with minimal administration or interaction [20]. Cloud computing architecture as Fig. 1 consists of four different layers which are standard definition, key features, and service and deployment model. The standard definition of cloud acts as the first layer that shape the key features of cloud computing. Next, the second layer consists of five key characteristics of the cloud that drives consumer engagement in service model and deployment model. Sometimes they know the location at a high-level abstraction, such as country, state, and data center. Storage, processing, memory, and network are the kind of resources that are assigned. Rapid elasticity is also one of the cloud computing characteristics, which means that resources are dynamically increased when needed and decreased when there is no need. Also, one of characteristics that a consumer Needs is measured service in order to know how much is Consumed. Also, it is needed by the cloud provider in order
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7734 to know how much the consumer has used in order to bill him or her. 2. Infrastructures of Cloud Security. Fig- 2: Cloud Security Infrastructure1 A single enterprise may provide many application services to end-users. E-mail servers and web servers are examples of application services providers. As company’s boundaries broaden, the number of application services grows. Mostly all service providers should authenticate clients before service transactions are executed, because they are dealing with personal information. This means that the client should have security context for each application server and log in before it can consume any service. The same situation happens when the client accesses resources in different security domains. As mentioned in the second chapter, having many security credentialsforauthentication purposes is not an effective solution from security, system coordination, and management perspectives. While organizations migrate to cloud environments, the same problem still exists. Cloud model is composed of five essential characteristics, three service models, and four deployment models as in the figure 3. In this technology users outsource their data to a server outside their premises, which is run by a cloud provider [4]. In addition, memory, processor, bandwidth and storage arevisualizedandcanbeaccessed by a client using the Internet [5]. Cloud computing is composed of many technologies such as service oriented architecture, virtualization, web 2.0 and more. There are many security issues with cloud computing. However, the cloud is needed by organizations due to the need for abundant resources to be used in high demand and the lack of enough resources to satisfy this need. Also,cloudcomputingoffers highlyefficient data retrieval and availability.Cloudproviders aretaking the responsibility of resource optimization. Fig- 3: Schematic definition of cloud computing Fig- 4: Cloud Security Infrastructure2 Mobile cloud computing is using the mobile as front end and the cloud as back end for the storage andcomputation.In the figure, mobile cloud computing consists of mobile computing, cloud computing, andnetwork. In,threeschemes are proposed for confidentiality and integrity of mobile device’s files stored in the cloud. The first scheme is encryption based Scheme (EnS). In this scheme, the mobile device encrypts the file and gets its hash code. The encryption key is a concatenation of the password entered by a user, file name changed to bits and file size to defend brute force attack on a cloud server since the length of the password is limited. Only the file name is kept in the file and everything related to the file is deleted. When downloading the file from the cloud server, onlythepasswordisneededto decrypt the file. This process will need more processing on the mobile device side.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7735 Future Points. Fig- 5: Multi-cloud computing Cloud computing now is moving to multi-cloud computing Because of security issues stemming from using a single cloud such data availability. This figure 16 shows how the clients connect to the clouds. Some of the issues that multi- cloud computing are data availability and security ,Cachinet et al. said Services of single clouds are still subject to outage. There is a fear among organizations that a single cloud would not fulfill their demands such as reliability and availability. Some organizations need the availability to be high and need their data to be far from being locked in. Therefore, they need a system that is always available and not under control of a single cloud provider. 3. CONCLUSION Implementations of cloud security solutions under the concept of Security as a Service are in their awaking phase. This research has proposeda cloudsecuritysystembased on That concept and made contributions in the area of authentication and authorization services for a cloud environment. The problem has been solved and the goals have been achieved. ACKNOWLEDGEMENT We are honored to work with our supervisor,PrincipalR.R. Utturkar, and we would like to thank him for his support and patient guidance during our master work. We are also thankful to the whole Computer Department team for a helpful collaboration. Finally, we would like to thank our whole family for their encouragement and invaluable support during this work period. REFERENCES [1] Meva and C. K. Kumbharana, “Issues and challenges of security in cloud computing environment.,” Int. J. Adv. Netw. Appl., pp. 108–111, 2015. [2] S. Abolfazli, Z. Sanaei, A. Tabassi, S. Rosen, A. Gani, and S. U. Khan, “Cloud adoption in Malaysia:Trends, opportunities, and challenges,”IEEECloudComput., vol. 2, no. 1, pp. 60–68, 2015. [3] L. Wei et al., “Security and privacy for storage and computation in cloud computing,” Inf. Sci. (Ny).,vol. 258, pp. 371–386, 2014. [4] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Secur. Priv., vol. 8, no. 6, pp. 24–31, 2010. [5] N. Fotiou, A. Machas, G. C. Polyzos, and G. Xylomenos, “Access control as a service for the cloud,” J. Internet Serv. Appl., vol. 6, no. 1, 2015. [6] A. H. Karp, H. Haury, and M. H. Davis, “From ABAC to ZBAC : The evolution of access control models,” ISSA J., no. April, pp. 22–30, 2010. [7] M. Mulimani and R. Rachh, “Analysis of access control methods in cloudcomputing,”no.July,2016. [8] V. Boyko, P. Mackenzie, and S. Patel, “Provably secure password-authenticated key exchangeusing Diffie-Hellman,” Eurocrypt, vol. 2, pp. 156–171, 2000. [9] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From RBAC to ABAC: constructing flexible data access control for cloud storage services,” IEEE Trans. Serv. Comput., vol. 8, no. 4, pp. 601–616, 2015. [10] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grainedaccess control of encrypted data,” Proc. 13th ACM Conf. Comput. Commun. Secur. - CCS ’06, p. 89, 2006. [11] A. Sudarsono, M. U. Harun, and A. Rasyid, “Secure data sensor in environmental monitoring system using attribute-based encryption with revocation,” vol. 7, no. 2, pp. 609–624, 2017. [12] D. Ricardo dos Santos, R. Marinho, G. Roecker Schmitt, C. Merkle Westphall, and C. Becker Westphall, “A framework and risk assessment approaches for risk-based access control in the cloud,” 2016. [13] B. Suzic, A. Reiter, F. Reimair, D. Venturi, and B. Kubo, “Secure data sharing and processing in heterogeneous clouds,” Procedia Comput. Sci., vol. 68, no. 316, pp. 116–126, 2015. [14] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, 2011. [15] Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, and A. V. Vasilakos, “A survey of security and privacy challenges in cloud computing: Solutions and future directions,” J. Comput. Sci. Eng., vol. 9, no. 3, pp. 119–133, 2015. [16] C. L. Hepsiba and J.G.R.Sathiaseelan,“Security issues in service models of cloud computing,” Int. J.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7736 Comput. Sci. Mob. Comput., vol. 5, no. 3, pp. 610– 615, 2016. [17] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012. [18] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and J. L. Hoon, “A strong user authentication framework for cloud computing,” in Proceedings - 2011 IEEE Asia- Pacific Services Computing Conference, APSCC 2011, 2011, pp. 110–115. [19] C. G. Song, N. Y. Hwang, H. C. Yu, and J. B. Lim, “A dynamic resource manager with effective resource isolation based on workload types in virtualized cloud computing environments,” Int. J.Adv.Sci.Eng. Inf. Technol., vol. 7, no. 5, pp. 1771–1776, 2017. [20] P. Mell and T. Grance, “The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology,” Nist Spec. Publ., vol. 145, p. 7, 2011. [21] B. Hari Krishna, S. Kiran, G. Murali, and R. Pradeep Kumar Reddy, “Security issues in service model of cloud computing environment,” in Procedia Computer Science, 2016,vol. 87,pp.246–251.Nurul Elliza asmin and Mohammad Khatim Hasan, “Framework for the implementation of E- Government system based on cloud computing for Malaysian public sector,” Ejournal.Ukm.My, vol. 7, no. 1, pp. 1–18, 2018. [22] Sairabi Mujawar, “Prediction of Heart Diseaseusing Modified K-means and by using Naive Bayes”, in International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 10, October 2015. [23] Sairabi Mujawar, Prakash Devale, “Heart Disease Prediction Using ModifiedK Means AndUsingNaive Baiyes”, International Journal of ComputerSciences and Engineering, Volume-3, Issue-10, 2015. BIOGRAPHIES Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. She had completed graduation in BE in Computer Engineering from Bharati Vidyapeeth college of Engineering, Mumbai University, Navi Mumbai, Maharashtra, India in 2007.
Download now