Open Access

A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment


1. Mell, P., T. Grance. The NIST Definition of Cloud, National Institute of Standards and Technology, 2011.10.6028/NIST.SP.800-145Search in Google Scholar

2. Wang, C., Q. Wang, K. Ren, W. Lou. Ensuring Data Storage inn Cloud Computing. – In: Proc. of 17th International Workshop on Quality of Service, 2009.Search in Google Scholar

3. Wang, Z. Security and Privacy Issues within the Cloud Computing. – In: Proc. of 2011 International Conference on Computational and Information Sciences, IEEE, 2011.10.1109/ICCIS.2011.247Search in Google Scholar

4. Hubbard, D. W., H. Z. Sutton. Top Threats to Cloud Computing. V1.0. 2010.Search in Google Scholar

5. Subashini, S., V. Kavitha. A Survey on Security Issues in Service Delivery Models of Cloud Computing. – Journal of Network and Computer Applications, Vol. 34, January 2011, No 1, pp. 1-11.10.1016/j.jnca.2010.07.006Search in Google Scholar

6. Robert, D., T. Stephen. A Survey on Securing the Virtual Cloud. – Journal of Cloud Computing: Advances, Systems and Applications, Vol. 2, 2013, No 1, pp. 2-17.10.1186/2192-113X-2-17Search in Google Scholar

7. Clavister. Security in the Cloud. 2009. in Google Scholar

8. Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2010, p. 640.Search in Google Scholar

9. Ausanka Crues, R. Methods for Access Control: Advances and Limitations. 2004.Search in Google Scholar

10. Bell, D., L. La Padula. Secure Computer Systems: Mathematical Foundations. Bedford, MA, 1973.Search in Google Scholar

11. Biba, K. Integrity Considerations for Secure Computer Systems. MA, Bedford, 1977.Search in Google Scholar

12. Harris, S. Mike Meyers’ CISSP (R) Certification Passport. 1st Ed. McGraw-Hill, 2002, p. 422.Search in Google Scholar

13. Lampson, B. Protection. – In: Proc. of 5th Princeton Symposium on Information Sciences and Systems, Princeton University, 1971.Search in Google Scholar

14. Samarati, P., S. Vimercati. Access Control: Policies, Models, and Mechanisms. Foundations of Security Analysis and Design, 2001, pp. 137-196.10.1007/3-540-45608-2_3Search in Google Scholar

15. Laurie, B. Access Control. V0.1. 2009.10.1007/978-0-387-73003-5_2007Search in Google Scholar

16. Oh, S., S. Park. Task-Role-Based Access Control Model. – Information Systems, Vol. 28, September 2003, No 6, pp. 533-562.10.1016/S0306-4379(02)00029-7Search in Google Scholar

17. Suhendra, V. A Survey on Access Control Deployment. – Communications in Computer and Information Science, Vol. 259, 2011, pp. 11-20.10.1007/978-3-642-27189-2_2Search in Google Scholar

18. Hu, V. C., K. Scarfone. Guidelines for Access Control Ssystem Evaluation Metrics. 2012.10.6028/NIST.IR.7874Search in Google Scholar

29. Al-Kahtani, R. Sandhu. A Model for Attribute-Based User-Role Assignment. – In: Proc. of 18th Annual Computer Security Applications Conference (ACSAC’02), IEEE Comput. Society, 2002.Search in Google Scholar

20. Karp, A., H. Haury, M. Davis. From ABAC to ZBAC: The Evolution of Access Control Models. 2009.Search in Google Scholar

21. Brucker, A., L. Brugger, P. Kearney, B. Wolff. An Approach to Modular and Testable Security Models of Real-World Health-Care Applications. – In: Proc. of 16th ACM Symposium on Access Control Models and Technologies (SACMAT’11), 2011.10.1145/1998441.1998461Search in Google Scholar

22. Cheng, P., P. Rohatgi. Fuzzy Multi-Level Security. – In: Proc. of IEEE Symposium on Security and Privacy, 2007, SP’07, 2007.Search in Google Scholar

23. Choudhury, A., P. Kumar, M. Sain, H. Lim, H. Jae-Lee. A Strong User Authentication Framework for Cloud Computing. – In: 2011 IEEE Asia-Pacific Services Computing Conference, 2011.10.1109/APSCC.2011.14Search in Google Scholar

24. Crago, S., K. Dunn, P. Eads, L. Hochstein, M. Kang. Heterogeneous Cloud Computing. – In: Proc. of 2011 IEEE International Conference on Cluster Computing, IEEE, 2011.10.1109/CLUSTER.2011.49Search in Google Scholar

25. Patil, V., A. Mei, L. Mancini. Addressing Interoperability Issues in Access Control Models. – In: Proc. of 2nd ACM Symposium on Information, Computer and Communications Security ASIACCS’07, 2007.10.1145/1229285.1229337Search in Google Scholar

26. Hu, V., D. Kuhn, D. Ferraiolo. The Computational Complexity of Enforceability Validation for Generic Access Control Rule. – In: Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), IEEE, 2006.Search in Google Scholar

27. Keromytis, A., J. Smith. Requirements for Scalable Access Control and Security Management Architectures. – ACM Transactions on Internet Technology, Vol. 7, 2007, No 2.10.1145/1239971.1239972Search in Google Scholar

28. Jin, X., R. Krishnan, R. Sandhu. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. – In: Proc. of 26th Annual Conference on Data and Applications Security and Privacy IFIP WG 11.3, 2012.10.1007/978-3-642-31540-4_4Search in Google Scholar

29. Almutairi, A., M. Sarfraz, S. Basalamah. A Distributed Access Control Architecture for Cloud Computing. – In: Proc. of Softw. IEEE 2012, 2012.10.1109/MS.2011.153Search in Google Scholar

30. Ferraiolo, D., J. Barkley, D. Kuhn. A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. – ACM Transactions on Information and System Security (TISSEC), Vol. 2, 1999, No 1, pp. 34-64.10.1145/300830.300834Search in Google Scholar

31. Hasebe, K., M. Mabuchi, A. Matsushita. Capability-Based Delegation Model in RBAC. – In: Proc. of 15th ACM Symposium on Access Control Models and Technologies e SACMAT’10, New York, USA, 2010.10.1145/1809842.1809861Search in Google Scholar

32. Oh, S., S. Park. Task Role-Based Access Control Model. – Information Systems, Vol. 28, September 2003, No 6, pp. 533-562.10.1016/S0306-4379(02)00029-7Search in Google Scholar

33. Zhang, R., L. Liu, J. Li, Z. Han. RBTBAC: Secure Access and Management of EHR Data. – In: Proc. of 3rd International Workshop on e-Healthcare Information Security (e-HISec’2011), 2011.Search in Google Scholar

34. Tianyi, Z., L. Weidong, S. Jiaxing. An Efficient Role Based Access Control System for Cloud Computing. – In: Proc. of 11th International Conference on Computer and InformationTechnology, 2011 IEEE.10.1109/CIT.2011.36Search in Google Scholar

35. Jayaprakash, H. A., M. H. Gunes. Ensuring Access Control in Cloud Provisioned Healthcare Systems. – In: Proc. of Consumer Communications and Networking Conference (CCNC’11), 2011.Search in Google Scholar

36. Sun, L., H. Wang, J. Yong, G. Wu. Semantic Access Control for Cloud Computing Based on e-Healthcare. – In Proc. of 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD’12), 2012 IEEE.10.1109/CSCWD.2012.6221866Search in Google Scholar

37. Tsai, W., Q. Shao. Role-Based Access Control Using Reference Ontology in Clouds. – In: Proc. of 10th International Symposium on Autonomous Decentralized Systems, 2011.10.1109/ISADS.2011.21Search in Google Scholar

38. Mon, E., T. Naing. The Privacy-Aware Access Control System Using Attribute-and Role-Based Access Control in Private Cloud. – In: Proc. of 4th IEEE International Conference on Broadband Network and Multimedia Technology, 2011.10.1109/ICBNMT.2011.6155974Search in Google Scholar

39. Ra, C. W. K., W. L. S. Yu. Achieving Secure, Scalable, and Fine-Grained Data Access. – In: Proc. of 29th IEEE International Conference on Information, 2010.Search in Google Scholar

40. Wan, Z., J. Liu, R. H. Deng. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. – IEEE Transactions on Information Forensics and Security, Vol. 7, April 2012, No 2, pp. 743-754.10.1109/TIFS.2011.2172209Search in Google Scholar

41. Jeremy, H., L. Ben. Toward Hierarchical Identity-Based Encryption. – Lecture Notes in Computer Science, Advances in Cryptology – EUROCRYPT 2002, Vol. 2332, Springer Berlin Heidelberg, 2002, pp. 466-481.Search in Google Scholar

42. Xin, D., Y. Jiadi, L. Yuan, C. Yingying. Achieving an Effective, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. – Computers & Security, Vol. 42, 2014, pp. 151-164.10.1016/j.cose.2013.12.002Search in Google Scholar

43. Liu, Q., G. Wang, J. Wub. Time-Based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment. – Information Sciences, Vol. 258, February 2014, No 10, pp. 355-370.10.1016/j.ins.2012.09.034Search in Google Scholar

44. Liu, H., Q. Xiong. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. – IEEE Transactions on Parallel and Distributed Systems, Vol. 26, January 2015, No 1, pp. 241-251.10.1109/TPDS.2014.2308218Search in Google Scholar

45. Nabeel, M., E. Bertino, B. Thuraisingham, M. Kantarcioglu. Towards Privacy Preserving Access Control in the Cloud. – In: Proc. of International Conference on Collaborative Computing: Networking, Aplications and Worksharing (CollaborateCom), Orlando, USA, 2011.Search in Google Scholar

46. Marian, H., F. Sascha, B. Michael, M. Thomas, S. Matthew. Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions. – In: Proc. of 10th Annual International Conference on Privacy, Security and Trust, 2012.Search in Google Scholar

47. Hassan, T. Privacy Aware Access Control for Data Sharing in Cloud Computing Environments. – In: Proc. of 2nd International Workshop on Security in Cloud Computing, 2014.Search in Google Scholar

48. Huang, X., Q. Tao, B. Qin, Z. Liu. Multi-Authority Attribute Based Encryption Scheme with Revocation. – In: Proc. of 24th IEEE International Conference on Computer Communication and Networks (ICCCN’2015), 201510.1109/ICCCN.2015.7288431Search in Google Scholar

49. Sahai, A., B. Waters. Fuzzy Identity-Based Encryption. – In: Advances in Cryptology – Lecture Notes in Computer Science, Springer, 2005, pp. 457-473.10.1007/11426639_27Search in Google Scholar

50. Nali, D., C. Adams, A. Miri. Using Threshold Attribute Based Encryption for Practical Biometric-Based Access Control. – International Journal of Network Security, Vol. 1, 2005, No 3, pp. 173-182.Search in Google Scholar

51. Goyal, V., O. Pandey, A. Sahai, B. Waters. Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data. – In: Proc. of 13th ACM Conference on Computer and Communications Security (CCS’06), November 2006.10.1145/1180405.1180418Search in Google Scholar

52. Bethencourt, J., A. Sahai, B. Waters. Ciphertext-Policy Attribute-Based Encryption. – In: Proc. of IEEE Symposium on Security and Privacy (SP’07), May 2007, pp. 321-334.10.1109/SP.2007.11Search in Google Scholar

53. Chase, M. Multi-Authority Attribute Based Encryption. – In: Proc. of 4th Conference on Theory of Cryptography TCC’07, 2007.Search in Google Scholar

54. Lin, H., Z. Cao, X. Liang, J. Shao. Secure Threshold Multi Authority Attribute Based Encryption Without a Central Authority. – Information Sciences, Vol. 180, 2010, No 13, pp. 2618-2632.10.1016/j.ins.2010.03.004Search in Google Scholar

55. Gennaro, R., S. Jarecki, H. Krawczyk, T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. – In: Proc. of Advances in Cryptology – EUROCRYPT’99, 1999.10.1007/3-540-48910-X_21Search in Google Scholar

56. Chase, M., S. S. M. Chow. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. – In: 16th ACM Conference on Computer and Communications, Chicago, Ill, USA, November 2009, pp. 121-130.10.1145/1653662.1653678Search in Google Scholar

57. Han, J., W. Susilo, Y. Mu, J. Yan. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. – IEEE Transactions on Parallel and DistributedSystems, Vol. 23, 2012, No 2, pp. 2150-2162.10.1109/TPDS.2012.50Search in Google Scholar

58. Lewko, A., B. Waters. Decentralizing Attribute-Based Encryption. – In: Advances in Cryptology, Lecture Notes in Computer Science, Heidelberg, Germany, Springer, 2011, pp. 568-588.10.1007/978-3-642-20465-4_31Search in Google Scholar

59. Raykova, M., H. Zhao, S. M. Bellovin. Privacy Enhanced Access Control for Outsourced Data Sharing. – In: Proc. of Financial Cryptography and Data Security, 2012.10.1007/978-3-642-32946-3_17Search in Google Scholar

Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology