SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7732
Authentication and Access Control for Cloud Computing Comparing
Problem Issues and Solutions
Prof. Rohini S. Pawar1, Prof. Sairabi H. Mujawar2
1Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India.
2Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Now a day’s all users to used latest technology
and currently most popular cloud based system or technique.
But in this technique is very useful and fast. What about the
security and its major problems. In this paper we discusses
about pros and cons. The emergence of pervasive cloud
computing has supported the transition of physical data and
machine into virtualization environment. However, security
threat and privacy have been identified as a challenge to
support the widespread adoption of cloud among user.
Moreover, user awareness on the importance of cloud
computing has increase the needs to safeguard the cloud by
implementing access control that works on dynamic
environment. Therefore, the emergence of Risk-Adaptable
Access Control (RAdAC) as a flexible medium in handling
exceptional access request is a great countermeasure to deal
with security and privacy challenges. However, the rising
problem in safeguarding users' privacy in RAdAC model has
not been discussed in depth by other researcher. This paper
explores the architecture of cloud computing and defines the
existing solutions influencing the adoption of cloud among
user. At the same time, the obscurity factor in protecting
privacy of user is found within RAdAC framework. Similarly,
the two-tier authentication scheme in RAdAC has been
proposed in responding to security and privacy challenges as
shown through informal security analysis.
Key words: Security; privacy, Access Controls, cloud
computing; risk access control; authentication.
1. INTRODUCTION
There has been a growing trend to store data in the cloud
with the dramatic increase in the amount of digital
information such as consumer’s personal data to larger
enterprises. They want to back up databases or store
archival data. Cloud data storage can be attractive for users
(individuals or enterprises) because it provides
unpredictable storage demands,requiringcheapstorage tier
or a low cost and long-term archive. Service providers can
focus more on the design of functions for enhance user
experience of their services without worrying about
resources to store the growing amount of data by
outsourcing clients data to the cloud. Cloud can provide on
demand resources so it can help service providers to
decrease their maintenance costs. Besides,cloudstoragecan
give a flexible and convenient way for users to access their
data from anywhere on any device or gadget. There are
distinctive sorts of infrastructures associatedwitha cloud.A
public cloud is a cloud which is made accessible to the
general public and also resources are allocated in a pay-as-
you-go manner. A private cloud is an internal cloud that is
built and operated by a single organization or association.
The organization has full control on the private cloud. The
private cloud cannot be accessed by external parties. Thus a
private cloud is frequently consideredtobemoresecureand
trusted.
1.1 Related Work
Now a day, secure data access control has become one of the
major concerns in a cloud storage system. As a logical
combination of attribute-based encryption and attribute-
based signature, attribute-based signcryption (ABSC) can
provide con_dentiality and an anonymousauthentication for
sensitive data and is more ef_cientthantraditional ``encrypt-
then-sign'' or ``sign-then-encrypt'' strategies. Thus, ABSC is
Suitable for _ne-grained access control in a semi-trusted
cloud environment and is gaining more and more attention
in recent years.
1.2 Problems and Solutions.
Table- 1: SECURITY ISSUE AND EXISTING SOLUTION IN
CLOUD COMPUTING
Author Security Issues Existing Solution
Subashini and
Kavitha
confidentiality and
data access.
virtualization.
authentication and
identity
management.
Service Level
Agreement (SLA).
framework.
and access control.
Zissis and Lekkas
privacy. management.
framework.
cryptography
encryption.
control.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7733
Shahzad
(DoS).
security.
Integrity,confidential
ity and data
availability.
control.
management.
authentication.
Y. Liu et al.
control.
virtualization.
control.
management.
Suzic et al.
management.
trust.
control.
cryptography for
encryption.
Hepsiba and J.G.R.
Sathiasee-lan
(DoS).
confidentiality and
data availability.
and access control.
information security.
protocol.
In addition, the level of privacy in the cloud
environment could help to preservetheconfidentialityofthe
data while protecting user identity. Whereas, level of
reliability relies on effective cloudmanagement byproviding
storage and communications to cater user needs. Thus, the
level of privacy and reliability are the dependent factor to
support the development of cloud technology in an
organization.
Fig- 1: Adaptation of Cloud Computing Architecture
Cloud computing is the internet-based technology that
includes a storage service and communication, efficient
resource management and incurs minimal cost. In addition,
cloud computing imposed on virtualization technology in
providing computing resourcesbasedonuser’srequirement
[19]. Based on standard definition by National Institute of
Standards and Technology (NIST), cloud computing is a
model that allows network accesstoresourcesonconfigured
computing (network, servers, applications, storage hub and
services) with minimal administration or interaction [20].
Cloud computing architecture as Fig. 1 consists of four
different layers which are standard definition, key features,
and service and deployment model. The standard definition
of cloud acts as the first layer that shape the key features of
cloud computing. Next, the second layer consists of five key
characteristics of the cloud that drives consumer
engagement in service model and deployment model.
Sometimes they know the location at a high-level
abstraction, such as country, state, and data center. Storage,
processing, memory, and network are the kind of resources
that are assigned. Rapid elasticity is also one of the cloud
computing characteristics, which means that resources are
dynamically increased when needed and decreased when
there is no need. Also, one of characteristics that a consumer
Needs is measured service in order to know how much is
Consumed. Also, it is needed by the cloud provider in order
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7734
to know how much the consumer has used in order to bill
him or her.
2. Infrastructures of Cloud Security.
Fig- 2: Cloud Security Infrastructure1
A single enterprise may provide many application
services to end-users. E-mail servers and web servers are
examples of application services providers. As company’s
boundaries broaden, the number of application services
grows. Mostly all service providers should authenticate
clients before service transactions are executed, because
they are dealing with personal information. This means that
the client should have security context for each application
server and log in before it can consume any service. The
same situation happens when the client accesses resources
in different security domains. As mentioned in the second
chapter, having many security credentialsforauthentication
purposes is not an effective solution from security, system
coordination, and management perspectives. While
organizations migrate to cloud environments, the same
problem still exists.
Cloud model is composed of five essential
characteristics, three service models, and four deployment
models as in the figure 3. In this technology users outsource
their data to a server outside their premises, which is run by
a cloud provider [4]. In addition, memory, processor,
bandwidth and storage arevisualizedandcanbeaccessed by
a client using the Internet [5]. Cloud computing is composed
of many technologies such as service oriented architecture,
virtualization, web 2.0 and more. There are many security
issues with cloud computing. However, the cloud is needed
by organizations due to the need for abundant resources to
be used in high demand and the lack of enough resources to
satisfy this need. Also,cloudcomputingoffers highlyefficient
data retrieval and availability.Cloudproviders aretaking the
responsibility of resource optimization.
Fig- 3: Schematic definition of cloud computing
Fig- 4: Cloud Security Infrastructure2
Mobile cloud computing is using the mobile as front end and
the cloud as back end for the storage andcomputation.In the
figure, mobile cloud computing consists of mobile
computing, cloud computing, andnetwork. In,threeschemes
are proposed for confidentiality and integrity of mobile
device’s files stored in the cloud. The first scheme is
encryption based Scheme (EnS). In this scheme, the mobile
device encrypts the file and gets its hash code. The
encryption key is a concatenation of the password entered
by a user, file name changed to bits and file size to defend
brute force attack on a cloud server since the length of the
password is limited. Only the file name is kept in the file and
everything related to the file is deleted. When downloading
the file from the cloud server, onlythepasswordisneededto
decrypt the file. This process will need more processing on
the mobile device side.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7735
Future Points.
Fig- 5: Multi-cloud computing
Cloud computing now is moving to multi-cloud computing
Because of security issues stemming from using a single
cloud such data availability. This figure 16 shows how the
clients connect to the clouds. Some of the issues that multi-
cloud computing are data availability and security ,Cachinet
et al. said Services of single clouds are still subject to outage.
There is a fear among organizations that a single cloud
would not fulfill their demands such as reliability and
availability. Some organizations need the availability to be
high and need their data to be far from being locked in.
Therefore, they need a system that is always available and
not under control of a single cloud provider.
3. CONCLUSION
Implementations of cloud security solutions under the
concept of Security as a Service are in their awaking phase.
This research has proposeda cloudsecuritysystembased on
That concept and made contributions in the area of
authentication and authorization services for a cloud
environment. The problem has been solved and the goals
have been achieved.
ACKNOWLEDGEMENT
We are honored to work with our supervisor,PrincipalR.R.
Utturkar, and we would like to thank him for his support
and patient guidance during our master work.
We are also thankful to the whole Computer Department
team for a helpful collaboration.
Finally, we would like to thank our whole family for their
encouragement and invaluable support during this work
period.
REFERENCES
[1] Meva and C. K. Kumbharana, “Issues and challenges
of security in cloud computing environment.,” Int. J.
Adv. Netw. Appl., pp. 108–111, 2015.
[2] S. Abolfazli, Z. Sanaei, A. Tabassi, S. Rosen, A. Gani,
and S. U. Khan, “Cloud adoption in Malaysia:Trends,
opportunities, and challenges,”IEEECloudComput.,
vol. 2, no. 1, pp. 60–68, 2015.
[3] L. Wei et al., “Security and privacy for storage and
computation in cloud computing,” Inf. Sci. (Ny).,vol.
258, pp. 371–386, 2014.
[4] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and
privacy challenges in cloud computing
environments,” IEEE Secur. Priv., vol. 8, no. 6, pp.
24–31, 2010.
[5] N. Fotiou, A. Machas, G. C. Polyzos, and G.
Xylomenos, “Access control as a service for the
cloud,” J. Internet Serv. Appl., vol. 6, no. 1, 2015.
[6] A. H. Karp, H. Haury, and M. H. Davis, “From ABAC
to ZBAC : The evolution of access control models,”
ISSA J., no. April, pp. 22–30, 2010.
[7] M. Mulimani and R. Rachh, “Analysis of access
control methods in cloudcomputing,”no.July,2016.
[8] V. Boyko, P. Mackenzie, and S. Patel, “Provably
secure password-authenticated key exchangeusing
Diffie-Hellman,” Eurocrypt, vol. 2, pp. 156–171,
2000.
[9] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From RBAC
to ABAC: constructing flexible data access control
for cloud storage services,” IEEE Trans. Serv.
Comput., vol. 8, no. 4, pp. 601–616, 2015.
[10] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grainedaccess
control of encrypted data,” Proc. 13th ACM Conf.
Comput. Commun. Secur. - CCS ’06, p. 89, 2006.
[11] A. Sudarsono, M. U. Harun, and A. Rasyid, “Secure
data sensor in environmental monitoring system
using attribute-based encryption with revocation,”
vol. 7, no. 2, pp. 609–624, 2017.
[12] D. Ricardo dos Santos, R. Marinho, G. Roecker
Schmitt, C. Merkle Westphall, and C. Becker
Westphall, “A framework and risk assessment
approaches for risk-based access control in the
cloud,” 2016.
[13] B. Suzic, A. Reiter, F. Reimair, D. Venturi, and B.
Kubo, “Secure data sharing and processing in
heterogeneous clouds,” Procedia Comput. Sci., vol.
68, no. 316, pp. 116–126, 2015.
[14] S. Subashini and V. Kavitha, “A survey on security
issues in service delivery models of cloud
computing,” J. Netw. Comput. Appl., vol. 34, no. 1,
pp. 1–11, 2011.
[15] Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, and A. V. Vasilakos, “A
survey of security and privacy challenges in cloud
computing: Solutions and future directions,” J.
Comput. Sci. Eng., vol. 9, no. 3, pp. 119–133, 2015.
[16] C. L. Hepsiba and J.G.R.Sathiaseelan,“Security issues
in service models of cloud computing,” Int. J.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7736
Comput. Sci. Mob. Comput., vol. 5, no. 3, pp. 610–
615, 2016.
[17] D. Zissis and D. Lekkas, “Addressing cloud
computing security issues,” Futur. Gener. Comput.
Syst., vol. 28, no. 3, pp. 583–592, 2012.
[18] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and J. L.
Hoon, “A strong user authentication framework for
cloud computing,” in Proceedings - 2011 IEEE Asia-
Pacific Services Computing Conference, APSCC
2011, 2011, pp. 110–115.
[19] C. G. Song, N. Y. Hwang, H. C. Yu, and J. B. Lim, “A
dynamic resource manager with effective resource
isolation based on workload types in virtualized
cloud computing environments,” Int. J.Adv.Sci.Eng.
Inf. Technol., vol. 7, no. 5, pp. 1771–1776, 2017.
[20] P. Mell and T. Grance, “The NIST definition of cloud
computing recommendations of the National
Institute of Standards and Technology,” Nist Spec.
Publ., vol. 145, p. 7, 2011.
[21] B. Hari Krishna, S. Kiran, G. Murali, and R. Pradeep
Kumar Reddy, “Security issues in service model of
cloud computing environment,” in Procedia
Computer Science, 2016,vol. 87,pp.246–251.Nurul
Elliza asmin and Mohammad Khatim Hasan,
“Framework for the implementation of E-
Government system based on cloud computing for
Malaysian public sector,” Ejournal.Ukm.My, vol. 7,
no. 1, pp. 1–18, 2018.
[22] Sairabi Mujawar, “Prediction of Heart Diseaseusing
Modified K-means and by using Naive Bayes”, in
International Journal of Innovative Research in
Computer and Communication Engineering, Vol. 3,
Issue 10, October 2015.
[23] Sairabi Mujawar, Prakash Devale, “Heart Disease
Prediction Using ModifiedK Means AndUsingNaive
Baiyes”, International Journal of ComputerSciences
and Engineering, Volume-3, Issue-10, 2015.
BIOGRAPHIES
Ph.D. Research Scholar,
Department of Computer
Technology, BVJNIOT, Pune, India.
Ph.D. Research Scholar,
Department of Computer
Technology, BVJNIOT, Pune, India.
She had completed graduation in
BE in Computer Engineering from
Bharati Vidyapeeth college of
Engineering, Mumbai University,
Navi Mumbai, Maharashtra, India
in 2007.

More Related Content

What's hot

Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 

What's hot (20)

Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
70 74
70 7470 74
70 74
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
G033030035
G033030035G033030035
G033030035
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 

Similar to IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions

An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud SecurityIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...James Heller
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET Journal
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud ComputingIRJET Journal
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing ReviewIRJET Journal
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 

Similar to IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions (20)

An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 

IRJET- Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7732 Authentication and Access Control for Cloud Computing Comparing Problem Issues and Solutions Prof. Rohini S. Pawar1, Prof. Sairabi H. Mujawar2 1Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. 2Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Now a day’s all users to used latest technology and currently most popular cloud based system or technique. But in this technique is very useful and fast. What about the security and its major problems. In this paper we discusses about pros and cons. The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis. Key words: Security; privacy, Access Controls, cloud computing; risk access control; authentication. 1. INTRODUCTION There has been a growing trend to store data in the cloud with the dramatic increase in the amount of digital information such as consumer’s personal data to larger enterprises. They want to back up databases or store archival data. Cloud data storage can be attractive for users (individuals or enterprises) because it provides unpredictable storage demands,requiringcheapstorage tier or a low cost and long-term archive. Service providers can focus more on the design of functions for enhance user experience of their services without worrying about resources to store the growing amount of data by outsourcing clients data to the cloud. Cloud can provide on demand resources so it can help service providers to decrease their maintenance costs. Besides,cloudstoragecan give a flexible and convenient way for users to access their data from anywhere on any device or gadget. There are distinctive sorts of infrastructures associatedwitha cloud.A public cloud is a cloud which is made accessible to the general public and also resources are allocated in a pay-as- you-go manner. A private cloud is an internal cloud that is built and operated by a single organization or association. The organization has full control on the private cloud. The private cloud cannot be accessed by external parties. Thus a private cloud is frequently consideredtobemoresecureand trusted. 1.1 Related Work Now a day, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute- based signature, attribute-based signcryption (ABSC) can provide con_dentiality and an anonymousauthentication for sensitive data and is more ef_cientthantraditional ``encrypt- then-sign'' or ``sign-then-encrypt'' strategies. Thus, ABSC is Suitable for _ne-grained access control in a semi-trusted cloud environment and is gaining more and more attention in recent years. 1.2 Problems and Solutions. Table- 1: SECURITY ISSUE AND EXISTING SOLUTION IN CLOUD COMPUTING Author Security Issues Existing Solution Subashini and Kavitha confidentiality and data access. virtualization. authentication and identity management. Service Level Agreement (SLA). framework. and access control. Zissis and Lekkas privacy. management. framework. cryptography encryption. control.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7733 Shahzad (DoS). security. Integrity,confidential ity and data availability. control. management. authentication. Y. Liu et al. control. virtualization. control. management. Suzic et al. management. trust. control. cryptography for encryption. Hepsiba and J.G.R. Sathiasee-lan (DoS). confidentiality and data availability. and access control. information security. protocol. In addition, the level of privacy in the cloud environment could help to preservetheconfidentialityofthe data while protecting user identity. Whereas, level of reliability relies on effective cloudmanagement byproviding storage and communications to cater user needs. Thus, the level of privacy and reliability are the dependent factor to support the development of cloud technology in an organization. Fig- 1: Adaptation of Cloud Computing Architecture Cloud computing is the internet-based technology that includes a storage service and communication, efficient resource management and incurs minimal cost. In addition, cloud computing imposed on virtualization technology in providing computing resourcesbasedonuser’srequirement [19]. Based on standard definition by National Institute of Standards and Technology (NIST), cloud computing is a model that allows network accesstoresourcesonconfigured computing (network, servers, applications, storage hub and services) with minimal administration or interaction [20]. Cloud computing architecture as Fig. 1 consists of four different layers which are standard definition, key features, and service and deployment model. The standard definition of cloud acts as the first layer that shape the key features of cloud computing. Next, the second layer consists of five key characteristics of the cloud that drives consumer engagement in service model and deployment model. Sometimes they know the location at a high-level abstraction, such as country, state, and data center. Storage, processing, memory, and network are the kind of resources that are assigned. Rapid elasticity is also one of the cloud computing characteristics, which means that resources are dynamically increased when needed and decreased when there is no need. Also, one of characteristics that a consumer Needs is measured service in order to know how much is Consumed. Also, it is needed by the cloud provider in order
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7734 to know how much the consumer has used in order to bill him or her. 2. Infrastructures of Cloud Security. Fig- 2: Cloud Security Infrastructure1 A single enterprise may provide many application services to end-users. E-mail servers and web servers are examples of application services providers. As company’s boundaries broaden, the number of application services grows. Mostly all service providers should authenticate clients before service transactions are executed, because they are dealing with personal information. This means that the client should have security context for each application server and log in before it can consume any service. The same situation happens when the client accesses resources in different security domains. As mentioned in the second chapter, having many security credentialsforauthentication purposes is not an effective solution from security, system coordination, and management perspectives. While organizations migrate to cloud environments, the same problem still exists. Cloud model is composed of five essential characteristics, three service models, and four deployment models as in the figure 3. In this technology users outsource their data to a server outside their premises, which is run by a cloud provider [4]. In addition, memory, processor, bandwidth and storage arevisualizedandcanbeaccessed by a client using the Internet [5]. Cloud computing is composed of many technologies such as service oriented architecture, virtualization, web 2.0 and more. There are many security issues with cloud computing. However, the cloud is needed by organizations due to the need for abundant resources to be used in high demand and the lack of enough resources to satisfy this need. Also,cloudcomputingoffers highlyefficient data retrieval and availability.Cloudproviders aretaking the responsibility of resource optimization. Fig- 3: Schematic definition of cloud computing Fig- 4: Cloud Security Infrastructure2 Mobile cloud computing is using the mobile as front end and the cloud as back end for the storage andcomputation.In the figure, mobile cloud computing consists of mobile computing, cloud computing, andnetwork. In,threeschemes are proposed for confidentiality and integrity of mobile device’s files stored in the cloud. The first scheme is encryption based Scheme (EnS). In this scheme, the mobile device encrypts the file and gets its hash code. The encryption key is a concatenation of the password entered by a user, file name changed to bits and file size to defend brute force attack on a cloud server since the length of the password is limited. Only the file name is kept in the file and everything related to the file is deleted. When downloading the file from the cloud server, onlythepasswordisneededto decrypt the file. This process will need more processing on the mobile device side.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7735 Future Points. Fig- 5: Multi-cloud computing Cloud computing now is moving to multi-cloud computing Because of security issues stemming from using a single cloud such data availability. This figure 16 shows how the clients connect to the clouds. Some of the issues that multi- cloud computing are data availability and security ,Cachinet et al. said Services of single clouds are still subject to outage. There is a fear among organizations that a single cloud would not fulfill their demands such as reliability and availability. Some organizations need the availability to be high and need their data to be far from being locked in. Therefore, they need a system that is always available and not under control of a single cloud provider. 3. CONCLUSION Implementations of cloud security solutions under the concept of Security as a Service are in their awaking phase. This research has proposeda cloudsecuritysystembased on That concept and made contributions in the area of authentication and authorization services for a cloud environment. The problem has been solved and the goals have been achieved. ACKNOWLEDGEMENT We are honored to work with our supervisor,PrincipalR.R. Utturkar, and we would like to thank him for his support and patient guidance during our master work. We are also thankful to the whole Computer Department team for a helpful collaboration. Finally, we would like to thank our whole family for their encouragement and invaluable support during this work period. REFERENCES [1] Meva and C. K. Kumbharana, “Issues and challenges of security in cloud computing environment.,” Int. J. Adv. Netw. Appl., pp. 108–111, 2015. [2] S. Abolfazli, Z. Sanaei, A. Tabassi, S. Rosen, A. Gani, and S. U. Khan, “Cloud adoption in Malaysia:Trends, opportunities, and challenges,”IEEECloudComput., vol. 2, no. 1, pp. 60–68, 2015. [3] L. Wei et al., “Security and privacy for storage and computation in cloud computing,” Inf. Sci. (Ny).,vol. 258, pp. 371–386, 2014. [4] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Secur. Priv., vol. 8, no. 6, pp. 24–31, 2010. [5] N. Fotiou, A. Machas, G. C. Polyzos, and G. Xylomenos, “Access control as a service for the cloud,” J. Internet Serv. Appl., vol. 6, no. 1, 2015. [6] A. H. Karp, H. Haury, and M. H. Davis, “From ABAC to ZBAC : The evolution of access control models,” ISSA J., no. April, pp. 22–30, 2010. [7] M. Mulimani and R. Rachh, “Analysis of access control methods in cloudcomputing,”no.July,2016. [8] V. Boyko, P. Mackenzie, and S. Patel, “Provably secure password-authenticated key exchangeusing Diffie-Hellman,” Eurocrypt, vol. 2, pp. 156–171, 2000. [9] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From RBAC to ABAC: constructing flexible data access control for cloud storage services,” IEEE Trans. Serv. Comput., vol. 8, no. 4, pp. 601–616, 2015. [10] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grainedaccess control of encrypted data,” Proc. 13th ACM Conf. Comput. Commun. Secur. - CCS ’06, p. 89, 2006. [11] A. Sudarsono, M. U. Harun, and A. Rasyid, “Secure data sensor in environmental monitoring system using attribute-based encryption with revocation,” vol. 7, no. 2, pp. 609–624, 2017. [12] D. Ricardo dos Santos, R. Marinho, G. Roecker Schmitt, C. Merkle Westphall, and C. Becker Westphall, “A framework and risk assessment approaches for risk-based access control in the cloud,” 2016. [13] B. Suzic, A. Reiter, F. Reimair, D. Venturi, and B. Kubo, “Secure data sharing and processing in heterogeneous clouds,” Procedia Comput. Sci., vol. 68, no. 316, pp. 116–126, 2015. [14] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, 2011. [15] Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, and A. V. Vasilakos, “A survey of security and privacy challenges in cloud computing: Solutions and future directions,” J. Comput. Sci. Eng., vol. 9, no. 3, pp. 119–133, 2015. [16] C. L. Hepsiba and J.G.R.Sathiaseelan,“Security issues in service models of cloud computing,” Int. J.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7736 Comput. Sci. Mob. Comput., vol. 5, no. 3, pp. 610– 615, 2016. [17] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012. [18] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and J. L. Hoon, “A strong user authentication framework for cloud computing,” in Proceedings - 2011 IEEE Asia- Pacific Services Computing Conference, APSCC 2011, 2011, pp. 110–115. [19] C. G. Song, N. Y. Hwang, H. C. Yu, and J. B. Lim, “A dynamic resource manager with effective resource isolation based on workload types in virtualized cloud computing environments,” Int. J.Adv.Sci.Eng. Inf. Technol., vol. 7, no. 5, pp. 1771–1776, 2017. [20] P. Mell and T. Grance, “The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology,” Nist Spec. Publ., vol. 145, p. 7, 2011. [21] B. Hari Krishna, S. Kiran, G. Murali, and R. Pradeep Kumar Reddy, “Security issues in service model of cloud computing environment,” in Procedia Computer Science, 2016,vol. 87,pp.246–251.Nurul Elliza asmin and Mohammad Khatim Hasan, “Framework for the implementation of E- Government system based on cloud computing for Malaysian public sector,” Ejournal.Ukm.My, vol. 7, no. 1, pp. 1–18, 2018. [22] Sairabi Mujawar, “Prediction of Heart Diseaseusing Modified K-means and by using Naive Bayes”, in International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 10, October 2015. [23] Sairabi Mujawar, Prakash Devale, “Heart Disease Prediction Using ModifiedK Means AndUsingNaive Baiyes”, International Journal of ComputerSciences and Engineering, Volume-3, Issue-10, 2015. BIOGRAPHIES Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. Ph.D. Research Scholar, Department of Computer Technology, BVJNIOT, Pune, India. She had completed graduation in BE in Computer Engineering from Bharati Vidyapeeth college of Engineering, Mumbai University, Navi Mumbai, Maharashtra, India in 2007.