Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 11)Publication Date: 2017-11-05
Authors : Mojtaba Mohamamdi; Keshav Kishore;
Page : 1940-1943
Keywords : Cloud Computing; Security; Access Control Models; DAC; MAC; RBAC; ABAC;
Abstract
When it comes to relying on cloud computing, security and privacy has always been a serious concern. Replacing cloud computing with traditional means of computing is a huge risk especially for enterprises which value security the most. Due to the resource sharing nature of cloud and diverse groups of users, restricting access to resources appears to be the only way to protect information against unauthorized access. Allowing activities of legitimate users, requires a selective restriction of access to resources which can be enforced through an appropriate access control mechanism. In this paper, we will compare different access control models that are used in cloud computing namely Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) and discuss the limitations of each model.
Other Latest Articles
- A Comprehensive Literature Review on Emotional Intelligence and Spirituality
- Metabolic Engineering for Production of UV Protective Compounds and Carotenoids from a Hot Spring Cyanophyte Synechocystis Pevalekii
- Intraradicular Splinting of a Coronal Horizontal Root Fracture with Surgical Repositioning of the Fractured Crown in a Permanent Maxillary Lateral Incisor: A Case Report
- Pregnant Womens Perception of Physical Activity During Pregnancy at Primary Health Care Centers in Baghdad City
- Role of Barium Esophagography and Computed Tomography in the Evaluation of Esophageal Carcinoma
Last modified: 2021-06-30 20:02:28