Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review

被引:0
作者
Albulayhi, Khalid [1 ]
Abuhussein, Abdullah [2 ]
Alsubaei, Faisal [3 ]
Sheldon, Frederick T. [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83844 USA
[2] St Cloud State Univ, Informat Syst Dept, St Cloud, MN 56301 USA
[3] Univ Jeddah, Coll Comp Sci & Engn, Jeddah 23890, Saudi Arabia
来源
2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) | 2020年
关键词
access control; cloud computing; encryption; access control model; fine-grained access control; SECURITY;
D O I
10.1109/ccwc47524.2020.9031179
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control is one of the imperative defense frontlines for digital computing environments especially for pervasive computing environments such as cloud computing and the internet of things (IoT) characterized by heterogeneous and distributed services and resources. Although, numerous access control models (ACM) have been implemented and used to prevent unauthorized access to cloud services and resources, these models may not prove efficacious to prevent overexposure and underexposure of data. More granular access control models or fine-grained access control therefore are developed to enable more itemized authorization policies. This paper presents a comparative analysis of different ACM used in the cloud with a focus on fine-grained access control models. First, we discuss the existing ACMs then and present the state-of-the-art research efforts carried out in the domain. Finally, we provide our analysis of the existing cloud-based access control methods and identify the gaps in the field for future work. This survey aims to improve the understanding and application of ACMs in the cloud and pave the road for future works in this area.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 41 条
[1]   CSSR: Cloud Services Security Recommender [J].
Abuhussein, Abdullah ;
Shiva, Sajjan ;
Sheldon, Frederick T. .
PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, :48-55
[2]   Evaluating Security and Privacy in Cloud Services [J].
Abuhussein, Abdullah ;
Alsubaei, Faisal ;
Shiva, Sajjan ;
Sheldon, Frederick T. .
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, :683-686
[3]  
Abuhussein A, 2012, INT CONF INTERNET, P388
[4]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[5]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[6]  
Ausanka-Crues R., 2001, METHODS ACCESS CONTR, P5
[7]   PPPDM - a privacy-preserving platform for data mashup [J].
Barhamgi, Mahmoud ;
Benslimane, Djamal ;
Ghedira, Chirine ;
Benharkat, Aicha-Nabila ;
Gancarski, Alda Lopes .
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2012, 3 (2-3) :175-187
[8]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]  
Bishop M.A., 2002, The Art and Science of Computer Security