Research on Access Control Techniques in SaaS of Cloud Computing

被引:0
作者
Rehman, Shabana [1 ]
Gautam, Rahul [2 ]
机构
[1] Salman Bin Abdul Aziz Univ, Dept Informat Syst, Al Kharj, Ksa, Saudi Arabia
[2] Ctr Dev Adv Comp, Dept Comp Sci, Nioda, Uttar Pradesh, India
来源
SECURITY IN COMPUTING AND COMMUNICATIONS | 2014年 / 467卷
关键词
Cloud Computing; SaaS; Access Control; Security; Research Directions;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Where the flexibility of Cloud Computing provides number of usage possibilities to the organizations, the security threats stop them in fully relying on it. Among all security threats, 'Unauthorized Access Threat' is one of the most important and difficult to manage. In SaaS, access control issues are of foremost concern. The aim of this paper is to explore the current trends that cloud providers are following in implementing access control measures in SaaS. In this article, a critical review of these measures is done and their advantages and drawbacks are discussed. On the basis of ongoing research, future research directions in the area of SaaS access control are also identified.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 31 条
  • [1] Aime MD, 2011, LECT NOTES BUS INF P, V74, P81
  • [2] [Anonymous], 2009, RISK TAXONOMY TECHNI
  • [3] [Anonymous], 1995, NIST ITL B
  • [4] [Anonymous], 2012, DROMA BRIVO INTRO SA
  • [5] [Anonymous], 2011, SPECIAL PUBLICATION
  • [6] Benantar M., 2009, ACCESS CONTROL SYSTE
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Cao J., 2013, COMPUTER SCI APPL
  • [9] Choi C., 2013, ONTOLOGY BASED ACCES
  • [10] Chou Y., 2011, 19 TEL FOR TELFOR SE