A survey on access control mechanisms for cloud computing

Cloud computing is an Internet‐based computing where the information technology resources are provided to end users following their request. With this technology, users and businesses can access programs, storage, and application development platforms through the Internet and via the services offere...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Transactions on emerging telecommunications technologies 2020-02, Vol.31 (2), p.n/a
Hauptverfasser: El Sibai, Rayane, Gemayel, Nader, Bou Abdo, Jacques, Demerjian, Jacques
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Cloud computing is an Internet‐based computing where the information technology resources are provided to end users following their request. With this technology, users and businesses can access programs, storage, and application development platforms through the Internet and via the services offered by the cloud service providers (CSPs). One of the biggest obstructions in the cloud computing environment is data security. Actually, the data are dispersed across multiple machines and storage devices such as servers, computers, and various mobile devices. The uncontrolled access to these resources and data leads to many important data security risks for the end users. In this way, and in order to ensure the reliability of the cloud and the trust of the users regarding this environment, controlling access to data and resources as well as protecting and ensuring their security becomes a critical task for CSPs. In this work, we present a comprehensive review of existing access control mechanisms used in the cloud computing environment. The advantages and disadvantages of each of these models are discussed and presented along with their analysis. Also, we study the cloud requirements of these models, and we evaluate existing control mechanisms against these requirements. 1‐ We presented a survey of existing access control mechanisms, especially, for Cloud‐based systems. 2‐ We presented an analysis of the advantages and disadvantages of the presented access control models. 3‐ We performed, based on a literature review, a study for the requirements for access control mechanisms in Cloud computing, and we evaluate existing access control models against these requirements.
ISSN:2161-3915
2161-3915
DOI:10.1002/ett.3720