Affiliation:
1. School of Information Technology & Engineering, VIT University Vellore, Tamil Nadu, India
Abstract
Abstract
Cloud computing has emerged as the most dominant computational paradigm in recent times. There are tremendous benefits for enterprises adopting cloud technologies. It provides resources and services on demand, pay-as-you go basis. This includes infrastructure, platform and software services. But there are still a number of security threats and challenges associated with utilizing cloud computing. A proper access control is the fundamental security requirement in any cloud environment, to avoid unauthorized access to the cloud systems. As cloud computing supports multi-tenancy and has a various categories of users with different sets of security requirements, traditional access control models and policies cannot be used. This paper discusses on various access control models used for cloud environment and presents a detailed requirement analysis for developing an access control, specifically for the cloud. A comprehensive study on various security problems associated with outsourced data on the cloud and their existing solutions are also described, with the future research directions.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation;Journal of Cloud Computing;2024-08-21
2. Access Control using Blockchain: A Taxonomy and Review;2022 the 6th International Conference on Information System and Data Mining;2022-05-27
3. A Comprehensive Review on Security and Privacy Preservation in Cloud Environment;Sustainable Communication Networks and Application;2022
4. Access Control Models;Cybernetics and Information Technologies;2021-12-01
5. A Comprehensive Overview of Privacy and Data Security for Cloud Storage;International Journal of Scientific Research in Science, Engineering and Technology;2021-09-08