This review paper include the introduction part of Big data environment with its various access control policy . The main aim of this paper is to make a survey of some existing control policy and introduce the security issue in the Cloud environment for the big data.
Cloud Computing, Big Data, control policy , security
Puya Ghazizadeh, Ravi Mukkamala & Stephan Olariu, 2013, “Data Integrity Evaluation in Cloud Database-as-a-Service”, IEEE Ninth World Congress on Services, 978-0-7695-5024-4/13, DOI 10.1109/SERVICES.2013.40, pp.280-285.
 Ling Lang & Lin wang, 2012, “Research on cloud computing and key technologies”, IEEE International Conference on Computer Science and Information Processing (CSIP), 978-1- 4673-1411-4/12, pp.863-866
 Mohammed A. AlZain & Ben Soh and Eric Pardede, 2013, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, pp. 230-235.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attributebased encryption for fine-grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98.
 J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in S&P’07. IEEE, 2007, pp. 321–334.
 B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in KC’11. Springer, 2011, pp. 53–70.
 A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully secure functional encryption: Attribute-based cryption and (hierarchical) inner product encryption,” in EUROCRYPT’10. Springer, 2010, pp. 62–91.
 A. B. Lewko and B. Waters, “Decentralizing attribute-based encryption,”in EUROCRYPT’11. Springer, 2011, pp. 568–588.
 S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, andvfine-grained data access control in cloud computing,” in INFOCOM’10.IEEE, 2010, pp. 534–542.
 K. Yang, X. Jia, and K. Ren, “Attribute-based fine-grained access control with efficient revocation in cloud storage systems,” in AsiaCCS’13. ACM, 2013, pp. 523–528.
 K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems,” IEEE Trans. Info. Forensics Security, vol. 8, no. 11, pp. 1790–1801, 2013.
 K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” IEEETrans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735–1744, July 2014.
 A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and ciphertext delegation for attribute-based encryption,” in CRYPTO’12. Springer, 2012, pp. 199–217.
Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah & Masrah Azrifah, 2011, “CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture”, IEEE Conference on 14
 Basant Narayan Singh,” Cloud Service Models – SaaS PaaS IaaS - Which One is for You?”, posted Tuesday, June 28, 2011
[Taniya Jain (2016) Review Paper of Various Access Control Policy IJIRCST Vol-3 Issue-4 Page No-310-313] (ISSN 2347 - 5552). www.ijircst.org
(M.Tech Scholar) Asst. Prof. Javed Akhtar Khan Department of Computer Science & Engineering Takshshila Group of Institute INDIA