Achieving Robust Biometric based Access Control Mechanism for Cloud Computing

Author(s):  
Kun Huang ◽  
Jiangyong Shi ◽  
Jian Liu ◽  
Ming Xian
Author(s):  
Lokesh B. Bhajantri ◽  
Tabassum N. Mujawar

Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.


Author(s):  
Sudha Senthilkumar ◽  
V. Madhu Viswanatham

Online gaming allows players from different location to play synchronously together for entertainment. Generally multimedia applications which is highly latency sensitive and it requires specific hardware, such as Graphic Processing Units (GPUs) and fast memory. Since recent advances in cloud computing makes it suitable for moving the gaming application to the cloud and streams the video sequence back to the player over the Internet. This is more beneficial for less powerful computational devices that are otherwise incapable of running high-quality games. In addition to this cloud gaming is platform independence means it allow you to play on your android or IOS powered devices. There are several cloud providers like On-Live, G-Cluster and GFACE are provides active game services. However, providing proper access control for games which require license to play various levels is one of the important requirements to play the online games. This paper proposes the suitable access control mechanism to provide the access to cloud gaming applications.


Author(s):  
Lokesh B. Bhajantri ◽  
Tabassum N. Mujawar

Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.


2021 ◽  
pp. 10805-10814
Author(s):  
Dr. T. Dheepak

Cloud computing is the emerging technology where resources are available pay as you go basis. Cloud storage technology provides the large pool of storage capacity to the cloud users. Providing security to the data stored in cloud is the major concern. So, Security can be enhanced by providing access control to the authorized users. Access control gives the authorization to the users which gives the access privileges on data and other resources. Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud.Access control is an important measure for the protection of information and system resources to prevent illegitimate users from getting access to protected objects and legitimate users from attempting to access the objects in ways that exceed what they are allowed. The restriction placed on access from a subject to an object is determined by the access policy. With the rapid development of cloud computing, cloud security has increasingly become a common concern and should be dealt with seriously.  In this paper, an enhanced access control mechanism is proposed with hierarchical attribute-based access control method.


Sign in / Sign up

Export Citation Format

Share Document