2014
DOI: 10.1007/978-1-4471-6452-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Access Control As a Service in Cloud: Challenges, Impact and Strategies

Abstract: The evolution of service-oriented architecture has given birth to the promising cloud technology, which enables the outsourcing of existing hardware and software information technology (IT) infrastructure via the Internet. Since the cloud offers services to a variety of organizations under the same umbrella, it raises security issues including unauthorized access to resources and misuse of data stored in third-party platform. The fact that the cloud supports multiple tenants is the cause for the biggest concer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 67 publications
0
3
0
Order By: Relevance
“…The group’s policies can address common issues such as data theft. However, Group 1 still faces some challenges: for example, internal data leakage and unauthorized access (Furfaro et al , 2014; Shibli et al , 2014). If the data protection policy is flawed or the EN key is lost, the system may attack more.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The group’s policies can address common issues such as data theft. However, Group 1 still faces some challenges: for example, internal data leakage and unauthorized access (Furfaro et al , 2014; Shibli et al , 2014). If the data protection policy is flawed or the EN key is lost, the system may attack more.…”
Section: Discussionmentioning
confidence: 99%
“…The access controls clause addresses requirements to control access to information assets and information processing facilities (Harter et al , 2018). The controls are focused on the protection against accidental damage or loss (Furfaro et al , 2014), overheating, threats (Shibli et al , 2014), etc. It links to Category 1 IAM in CSA obviously (McLaren et al , 2013; Waters, 2016).…”
Section: Classificationmentioning
confidence: 99%
“…Unauthorized persons have a bar to access that information outside of the organization. Different social engineering attacks, cybercrime has been employed to penetrate into the cloud storage by any unauthorized hacker [31].…”
Section: Limitation Of Bandwidthmentioning
confidence: 99%