1. bibitem{1} V. C. Hu, M. Iorga, W. Bao, A. Li, Q. Li, and A. Gouglidis, "General Access Control Guidance for Cloud Systems," NIST Special Publication 800-210, pp. 1-34, 2020.
2. bibitem{2} I. Indu, P. M. R. Anand, and V. Bhaskar, "Identity and access management in cloud environment: Mechanisms and challenges," Eng. Sci. Technol. Int. J., vol. 21, pp. 574-588, 2018.
3. bibitem{3} Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 743-754, 2012.
4. bibitem{4} I. S. Sohal and A. Kaur, "Review on advanced access control models in cloud," The research journal (TRJ), pp. 1-6, 2016.
5. bibitem{5} B. M. Dr. I. M. Rafia Naz, "Comparative analysis of Cloud database, remote database, and traditional database," Int. J. Comput. Sci. Inf. Security (IJCSIS), vol. 14, no. 10, pp. 242-246, 2016.