Survey on access control model in cloud computing environment

被引:4
|
作者
Li, Xinlu [1 ]
Zhao, Xiaoxia [2 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Kunming Univ Sci & Technol, Calculating Ctr, Kunming, Peoples R China
关键词
Access control; Cloud computing; Cloud storage; Data security; INFORMATION;
D O I
10.1109/CLOUDCOM-ASIA.2013.103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper firstly sums up the main security threats to data confidentiality in cloud computing environment, then classifies and introduces the existing access control models according to the core strategy they have adopted. Lastly this paper points out the main challenges facing access control in cloud computing environment and the subsequent research directions.
引用
收藏
页码:340 / 345
页数:6
相关论文
共 50 条
  • [1] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    [J]. MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [2] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [3] Survey on Access Control Issues in Cloud Computing
    Charanya, R.
    Aramudhan, M.
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [4] A Survey of Cloud Computing Access Control Technology
    Wang, Minghao
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [5] A survey on access control mechanisms for cloud computing
    El Sibai, Rayane
    Gemayel, Nader
    Abdo, Jacques Bou
    Demerjian, Jacques
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [6] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [7] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [8] Survey of access control models and technologies for cloud computing
    Cai, Fangbo
    Zhu, Nafei
    He, Jingsha
    Mu, Pengyu
    Li, Wenxin
    Yu, Yi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S6111 - S6122
  • [9] Survey of access control models and technologies for cloud computing
    Fangbo Cai
    Nafei Zhu
    Jingsha He
    Pengyu Mu
    Wenxin Li
    Yi Yu
    [J]. Cluster Computing, 2019, 22 : 6111 - 6122
  • [10] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231