A Multi-Level access control scheme towards software as a service in cloud computing

M Suneetha, G Vijaya Kumari


Cloud computing is a model of data computing, storage, conveyance of services and sharing source assets gave to customers on their request. Rather than obtaining real physical gadgets servers, stockpiling, or any systems administration hardware, client utilized these assets from a cloud supplier as an outsourced benefit. It characterized as a model of administration of data, assets and applications as services over Internet according to prerequisite of clients‖. Cloud processing is a way to deal with helpful and on request arrange access to a shared gathering of registering assets that can be given by specialist organization as different services. It presents another Internet-based condition for on-request access, dynamic arrangement for processing assets by utilizing different compose services on cloud. These models are alluded as Software as a Service, Platform as a Service and Infrastructure as a Service. This paper proposing a system that distinguishes and outline the security and privacy challenges in cloud services. It features cloud-particular assaults and hazards and unmistakably outlines their alleviations and countermeasures. This is likewise feature a multilevel security structure for cloud registering that fulfills security and privacy prerequisites in the clouds and ensure them against gatecrasher assaults. The motivation behind this work is to exhibit and presented a security and privacy viewpoint that will take into contemplations while creating and utilizing the cloud condition either by people or associations.


Attribute-Based Access; Access Control. Privacy Preserving, Anonymous authentication.


Harish shah, Shrikant, Sharma Shankar Anadane, “Security Issues in Cloud Computing”.

Ahmad Youssef, “A Framework for secure cloud computing”, IJCSI international Journal of Computer Science, Issues, Vol 9, Issues4, N0 3 July 2012, ISSN(Online) 1694-0814, www.IJCSI.org

Ramasami S., Umamaheshwari P., Survey on data security issues and data security model in cloud computing, International Journal of Engineering and Technology (IJEIT), Volume 1, issue 3,March 2012.

Ayesha Malik, Muhammad Moshin Nazir, Security Framework for cloud computing environment : A review, Journal of engineering trends in computing and information sciences, vol. 3 No. 3 March 2012, ISSN 2079-8407.

Wayne A. Jansen, NIST, Cloud hooks: Security and Privacy in cloud computing, Proceeding of the Hawaii International conferences on System Sciences-2011.

Furukawa jun, Furukawa ryo, Mori Kengo, Mori Takuya, Toshiyuki, Araki Toshinor, “A Privacy-Protection Data Processing Solution Based on Cloud Computing”, NEC Technical Journal, Vol. 8 No.1, Special Issue on Solving Social Issues through Business Activities

Summathi M, Shravan G.S, Dinesh H.A, Implementation of Multifactor Authentication System for Accessing Cloud Service, International Journal of Scientific and Research Publication, Volume 3, Issues 6, June 2013.

Sh. Ajoudanian , M.R. Ahmadi, “A Novel Data Security Model for Cloud Computing”. ISCSIT International Journal of Engineering and Technology, Bol. 4, No. 3, June 2012.

Masayuki Okuhara, Tetsuo Shiozaki, Takuya Suzuki, “Security architecture for Cloud Compting”, FUJITSU Sci. Tech. J, Vol 46, No. 4, PP. 397-402 (October 2010).

Ali Newaz Bahar, Md. ahsanHabib, Md. Manowarul Islam, “Security architecture for Mobile Cloud Computing”, International Journal of Scientific and Knowledge Computing and Information Technology, 2012-13, IJSK & KAJ, July 2013, Vol. 3 No. 3.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.