z-logo
Premium
A survey on access control mechanisms for cloud computing
Author(s) -
El Sibai Rayane,
Gemayel Nader,
Bou Abdo Jacques,
Demerjian Jacques
Publication year - 2020
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.3720
Subject(s) - cloud computing , computer science , access control , cloud computing security , computer security , the internet , task (project management) , server , cloud testing , reliability (semiconductor) , utility computing , data security , data access , world wide web , database , encryption , operating system , engineering , power (physics) , physics , systems engineering , quantum mechanics
Cloud computing is an Internet‐based computing where the information technology resources are provided to end users following their request. With this technology, users and businesses can access programs, storage, and application development platforms through the Internet and via the services offered by the cloud service providers (CSPs). One of the biggest obstructions in the cloud computing environment is data security. Actually, the data are dispersed across multiple machines and storage devices such as servers, computers, and various mobile devices. The uncontrolled access to these resources and data leads to many important data security risks for the end users. In this way, and in order to ensure the reliability of the cloud and the trust of the users regarding this environment, controlling access to data and resources as well as protecting and ensuring their security becomes a critical task for CSPs. In this work, we present a comprehensive review of existing access control mechanisms used in the cloud computing environment. The advantages and disadvantages of each of these models are discussed and presented along with their analysis. Also, we study the cloud requirements of these models, and we evaluate existing control mechanisms against these requirements.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here