|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Friday 22 November 2024

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJISR

   
 
 
 

Access Control Model for Data Stored on Cloud Computing


Volume 20, Issue 1, January 2016, Pages 233–241

 Access Control Model for Data Stored on Cloud Computing

Adnan Ahmad Malik1, Bilal Hussain2, and Syed Ozair Hussain Kazmi3

1 Computer Sciences, CS Department University of Agriculture, Faisalabad, Punjab, Pakistan
2 Computer Sciences, CS Department University of Agriculture Faisalabad, Punjab, Pakistan
3 Computer Sciences, CS Department University of Agriculture, Faisalabad, Punjab, Pakistan

Original language: English

Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


Cloud Computing (CC) is a internet based computing technology having shared scalable infrastructure that can be used as service by users. Simply CC can be referred as hardware & software deliverable using internet that is also as a service. An outstanding innovation & technology getting popular due to lower-cost, flexibility and scalability as per user's requirement. Regardless of its popularity large organizations, enterprises are reluctant to move on cloud computing due to its security issues, especially user's data security. Organizations have expressed concern over data security as their confidential and sensitive data needs to be stored by service provider at any location globally, that's why security can't be compromised at all. CC has different security issues at different levels like software security, platform security, infrastructure security etc. This research shall take a review and to focus on user's data security i.e. data storage security issues and how to minimize unauthorized access to data, then available solutions will be presented and an access control model will be suggested. It'll help the reluctant users to easily decide to shift on cloud while understanding the risks associated with CC.

Author Keywords: Access Control Model, Cloud Computing, Data Security, Infrastructure Security, Organization's Data, Platform Security, Unauthorized Access.


How to Cite this Article


Adnan Ahmad Malik, Bilal Hussain, and Syed Ozair Hussain Kazmi, “Access Control Model for Data Stored on Cloud Computing,” International Journal of Innovation and Scientific Research, vol. 20, no. 1, pp. 233–241, January 2016.