A Survey
A Survey
Abstract:
Access Control is any mechanism by which a system provides the right to access some data, or perform some action.
Access control is the process of mediating every request to resources and data preserve by a system and determining
whether the request should be granted or denied. The access control decision is followed by implementing some
policies, rules and regulations which are as follows:
Access Control systems have the following properties:
Keywords:
Access Control Mechanism, Computer Security, DAC, MAC, RBAC.
Introduction:
Access control mechanisms are a necessary and crucial design element to any application's security or computer
security. A web application should secure data and system resources by providing access control restrictions i.e.
restricting what users can do, which resources they can access, and what are the functions they are allowed to
perform on the provided data. Ideally, an access control scheme should protect against the unauthorized or illegal
viewing, fabrication, modification, or copying of data. Additionally, access control mechanisms can also help restrict
harmful code execution, or unauthorized actions through an attacker or cracker exploiting infrastructure
dependencies (DNS server, ACE server, etc.).
Authorization and Access Control are terms often mistakenly interchanged. Authorization can be defined as the
process of checking to see if a user has the proper permissions to access a specified file or perform a particular task,
assuming that user has successfully authenticated himself. Authorization is very much credential focused and
dependent on specific rules and access control lists preset by the web application administrator(s) or data owners.
General authorization process checks involve use for membership in a particular user group, possession of a specific
clearance, or looking for that user on a resource's approved access control list, akin to a bouncer at an exclusive
nightclub. Any access control mechanism is mainly dependent on effective and forge-resistant authentication of
controls used for authorization.
There are various types of access control mechanism. Some of them are DAC, MAC, RBAC and Rule based.
s
Fig: DAC, MAC and RBAC (reference from Cloud Audit).
abstract and hard to verify directly. The idea of separation of duty is to indirectly verify the correspondence to realworld entities by dividing a task among several principals. Provided these principals do not conspire, this
mechanism should prevent both fraud and error.
Conclusion:
Access control is a major research area which will enhance the security on users data that are stored in cloud
environment. Ensuring access control enhances the security. We have analyzed various access control mechanism
that are used in previous and current. A comprehensive and description and analysis of DAC, MAC and RBAC
provide the importance of access control to ensure the security of users information. In this study we have analyzed
the various access control technique that are popularly used such as DAC, MAC, RBAC, etc. Access control is
based on the above mechanism basically and performance also compared based on the user satisfaction. But in the
large distributed system like and grid needs more flexible and scalable access control. The advantage and
disadvantage of various access control technology discussed with their performance. The traditional access control is
DAC, MAC and RBAC and related access control technologies also discussed further. This survey ensures the need
of security of user and authentication need of user and security of cloud information by providing enhanced access
control technology. The main contribution of this paper is to understand the various access control mechanisms in
cloud.
References:
[1] Punithasurya K and Jeba Priya S Analysis of Different Access Control Mechanism in Cloud
[2] Ravi S. Sandhu and Pierangela Samarati Access Control: Principles and Practice IEEE Communications
Magazine, September 1994.
[3] Yingjie Xia, Li Kuang and Mingzhe Zhu A Hierarchical Access Control Scheme in Cloud using HHECC
Information Technology Journal 9 (8): 1598-1606, 2010
[4] Hazen A.Weber Role Based Access Control: The NIST solution San Institute of Info Reading Room, October
3, 2008.
[5] Joon S.Park, Gail-Joon Ahn, Ravi Sandhu Role-based Access control on the web using LDAP
[6] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shanbiao Wang, Towards Temporal Access Control in
Cloud Computing,
[7] G. Ahn, R. Sandhu. Role-based authorization constraint specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.),
2000.