2019
DOI: 10.1002/ett.3720
|View full text |Cite
|
Sign up to set email alerts
|

A survey on access control mechanisms for cloud computing

Abstract: Cloud computing is an Internet‐based computing where the information technology resources are provided to end users following their request. With this technology, users and businesses can access programs, storage, and application development platforms through the Internet and via the services offered by the cloud service providers (CSPs). One of the biggest obstructions in the cloud computing environment is data security. Actually, the data are dispersed across multiple machines and storage devices such as ser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(34 citation statements)
references
References 88 publications
0
23
0
Order By: Relevance
“…The access control process has also been optimized to meet the need for high efficiency and lightweight calculation for IoT devices. In [13], the authors comprehensively expound the existing access control mechanisms used in the cloud computing environment, analyze the advantages and disadvantages of these models and application requirements, and evaluate the existing access control mechanisms based on these requirements.…”
Section: Related Workmentioning
confidence: 99%
“…The access control process has also been optimized to meet the need for high efficiency and lightweight calculation for IoT devices. In [13], the authors comprehensively expound the existing access control mechanisms used in the cloud computing environment, analyze the advantages and disadvantages of these models and application requirements, and evaluate the existing access control mechanisms based on these requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Emerging technologies are radically changing the technology and business scenes. The most recent wave dates back to the second half of the 2000s starting with cloud computing [14,36] and the fourth-generation mobile networks (4G) [11,15] and evolving into the internet of things (IoT), blockchain and 5G. Applications used to be imagined in science-fiction movies, such as self-driving cars [60] and ambulance performed telesurgery [77], are becoming possible thanks to the emerging disruptive technologies [69].…”
Section: Introductionmentioning
confidence: 99%
“…When users store their private data in a cloud server, they lose control of their data. To ensure privacy, it is necessary to design security mechanisms and architectures to effectively protect the private data stored in the cloud [1]- [3].…”
Section: Introductionmentioning
confidence: 99%