A survey on access control mechanisms for cloud computing

被引:33
作者
El Sibai, Rayane [1 ]
Gemayel, Nader [2 ]
Abdo, Jacques Bou [2 ]
Demerjian, Jacques [3 ]
机构
[1] Al Maaref Univ, Fac Engn Univ, Beirut, Lebanon
[2] Notre Dame Univ, Fac Nat & Appl Sci, Lebanon, NH USA
[3] Lebanese Univ, Fac Sci, LaRRIS, Lebanon, NH USA
关键词
ATTRIBUTE-BASED ENCRYPTION; SECURE; EFFICIENT; TAXONOMY; SCHEME; TRUST; MODEL;
D O I
10.1002/ett.3720
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing is an Internet-based computing where the information technology resources are provided to end users following their request. With this technology, users and businesses can access programs, storage, and application development platforms through the Internet and via the services offered by the cloud service providers (CSPs). One of the biggest obstructions in the cloud computing environment is data security. Actually, the data are dispersed across multiple machines and storage devices such as servers, computers, and various mobile devices. The uncontrolled access to these resources and data leads to many important data security risks for the end users. In this way, and in order to ensure the reliability of the cloud and the trust of the users regarding this environment, controlling access to data and resources as well as protecting and ensuring their security becomes a critical task for CSPs. In this work, we present a comprehensive review of existing access control mechanisms used in the cloud computing environment. The advantages and disadvantages of each of these models are discussed and presented along with their analysis. Also, we study the cloud requirements of these models, and we evaluate existing control mechanisms against these requirements.
引用
收藏
页数:21
相关论文
共 98 条
[1]  
Adnan NAN, 2018, P 4 INT C SOFT COMP
[2]  
Alguliev RM, 2013, P 3 INT C INN COMP T
[3]  
Alipour HS, 2012, P INT C IND ENG OP M
[4]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[5]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[6]  
Alshiky A.M., 2017, International Journal on Cloud Computing: Services and Architecture (IJCCSA), V7, P27
[7]  
[Anonymous], 1976, TECH REP
[8]  
[Anonymous], MOVING CLOUD CORPORA
[9]  
[Anonymous], P 14 ACM C COMP COMM
[10]  
[Anonymous], P IEEE S SEC PRIV SP