Data Access Control in the Cloud Computing Environment for Bioinformatics

Data Access Control in the Cloud Computing Environment for Bioinformatics

Suyel Namasudra
Copyright: © 2021 |Pages: 11
DOI: 10.4018/IJARB.2021010105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Bioinformatics is a branch of science that applies computational science in the biological world. In bioinformatics, large sizes of biological data (genome) are processed in the cloud computing platform. Due to the advantages of cloud computing, such as reduced cost scalability, high performance, unlimited storage and many more, the applications of cloud computing in bioinformatics are increasing exponentially. However, cloud computing has some disadvantages like security, privacy, transferability, etc. Among all these problems, access control is a critical issue in the cloud computing environment. The main objective of this paper is to present many access control models along with their advantages and disadvantages. Moreover, some of the popular cloud-based bioinformatics applications are also introduced for the benefit of researchers.
Article Preview
Top

1. Introduction

Cloud computing facilitates fast and efficient parallel processing of terabyte-scale data in the virtual environment (Huthand & Chebula, 2011). In cloud computing, there are three entities (stakeholders) namely Data Owner (DO), Cloud Service Provider (CSP) and user. The DO shares their own data or file on the cloud server. The CSP provides the cloud services for both DO and user. The users access data or file from the cloud server (Namasudra et al., 2014; Zhang et al., 2010; Namasudra & Roy, 2017a). The users cannot access data randomly by their wishes. Each CSP has its own access policy or right. So, when the users want to access any data or file from the cloud server, they must satisfy the access right to access the requested data from the cloud environment.

There are mainly four types of cloud deployment models:

  • 1.

    Private cloud

  • 2.

    Public cloud

  • 3.

    Community cloud

  • 4.

    Hybrid cloud

A private cloud infrastructure is solely operated by a single organization. It can be managed by an organization or by a third party. In a public cloud, the CSP provides the resources, such as network, server, etc. to the users. Anyone can join in the public cloud. In a community cloud infrastructure, a cloud environment is shared by a community/several communities. All these communities must have a common goal. Hybrid cloud is the combination of public, private and community cloud. It is managed by a central administrator.

Cloud services can be provided in three ways, namely Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Figure 1 shows the simple scenario of a cloud environment.

Figure 1.

Simple scenario of a cloud environment

IJARB.2021010105.f01

In a cloud environment, when the CSP receives a data access request from a user, it must provide public key of the DO to the user to get the secret key and other necessary credentials. So, if the CSP takes much time to search the DO, the user must wait to get the details. So, in result, the data accessing time is also increased. Thus, user must need to pay more for using the cloud services. In the existing Access Control Model (ACM), the DO must be always online during the entire data communication process, so load on the CSP i.e. system overhead is increased (Gao et al., 2012). Another critical issue in a cloud environment is data security due to the presence of hackers. Those hackers are geographically distributed, and always want to unauthorized access of the confidential data. Sometimes, they change the original data, which is very difficult to identify for any cloud service provider. Many researchers have proposed many access control models to solve these issues, namely high searching time of the DO, high data or file accessing, high system overhead and data security (Namasudra, 2019; Sarkar et al., 2015; Namasudra et al., 2017a; Zhao et al, 2019; Namasudra et al., 2020a; Namasudra, 2018a; Namasudra et al., 2017b; Alguliyev et al., 2020; Namasudra et al, 2017c; Namasudra & Roy, 2016; Namasudra et al., 2020b; Namasudra & Deka, 2018a; Li et al., 2019; Namasudra et al., 2018a; Namasudra et al., 2020c; Namasudra & Deka, 2018b; Namasudra & Roy, 2018; Namasudra et al., 2018b; Deka & Borah, 2012; Namasudra & Roy, 2017b).

Complete Article List

Search this Journal:
Reset
Volume 13: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 12: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 11: 2 Issues (2021)
Volume 10: 2 Issues (2020)
Volume 9: 2 Issues (2019)
View Complete Journal Contents Listing