2023
DOI: 10.1016/j.csa.2023.100015
|View full text |Cite
|
Sign up to set email alerts
|

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 80 publications
0
8
0
Order By: Relevance
“…This allows for a more nuanced and flexible control over access compared to traditional access control methods (EDITOR JEFFREY VOAS, n.d.). One of the key advantages of ABAC lies in its ability to provide finer access settings by leveraging attributes such as user roles, data classification, access times, and other contextual information, and Access control techniques for cloud, blockchain, and SDN (Golightly et al, 2023). This enables organizations to tailor access policies according to their specific needs and regulatory requirements.…”
Section: Introductionmentioning
confidence: 99%
“…This allows for a more nuanced and flexible control over access compared to traditional access control methods (EDITOR JEFFREY VOAS, n.d.). One of the key advantages of ABAC lies in its ability to provide finer access settings by leveraging attributes such as user roles, data classification, access times, and other contextual information, and Access control techniques for cloud, blockchain, and SDN (Golightly et al, 2023). This enables organizations to tailor access policies according to their specific needs and regulatory requirements.…”
Section: Introductionmentioning
confidence: 99%
“…This research was pivotal in addressing IoT network complexities, focusing on energy efficiency and resource optimization. (Golightly et al, 2023) The paper presented a comprehensive survey that evaluated various access control methods like ACLs, RBAC, and ABAC in distributed environments including Cloud, Blockchain, IoT, and SDN. The paper discussed how these methods addressed modern cybersecurity challenges and legal compliance in data privacy, emphasizing the importance of effective access control in maintaining system integrity and preventing unauthorized access.…”
mentioning
confidence: 99%
“…A blockchain is a distributed ledger that enables multiple parties to share and verify data without the need for intermediaries [9], [10]. Transactions on a blockchain are secured through cryptography and, once recorded, they cannot be voluntarily modified or deleted [11]. This makes blockchain technology an attractive option for securing IoT systems, particularly those that involve multiple parties with conflicting interests [12], [13].…”
mentioning
confidence: 99%
“…The integration of blockchain technology and IoT systems has the potential to offer a range of features for secure and decentralized data management [9]- [12]. However, it remains challenging to implement effective access control within blockchain-enabled IoT (BIoT) systems [6], [11]- [15]. Existing access control mechanisms such as discretionary access control (DAC), role-based access control (RBAC), attribute-based access control (ABAC), and policybased access control (PBAC) [5]- [8], [13]- [16] are often not suited to the dynamic and context-dependent nature of IoT environments, thus a robust, context-aware strategy for the protection of security and the privacy of resources within BIoT systems is required.…”
mentioning
confidence: 99%
See 1 more Smart Citation