Journal: International Journal Of Computer & Organization Trends (ijcot)
ISSN Number:
0
Downloads
11
Views
Abstract
This paper reviews access control methods as they relate to cloud computing. Although advantages of cloud computing over traditional computing techniques cannot be overemphasised; cloud computing presents new security challenges which traditional access control method may not be able to handle, hence proposed access control methods for cloud computing were reviewed and the drawback of each method highlighted. A characterisation of the access control methods was attempted using the various features discussed in literature and comparison of the characteristics was done. From the analysis, features of RBAC and ABAC are the best among the Access Control methods but both has weaknesses in confidentiality and integrity. ABAC was also shown to be very complex. Hence it was suggested that research efforts should be concentrated in building ABAC model that is more secure and easy to implement.
Oyeyinka,F. IDOWU,S. Kuyoro,S. Joshua,J. Debo,A. EZE,M. EBIESUWA,O. .
(2018). A Critical Comparative Study and Characterisation of Access Control Model, 8
(), 7-7.
Oyeyinka,F. IDOWU,S. Kuyoro,S. Joshua,J. Debo,A. EZE,M. EBIESUWA,O. .
"A Critical Comparative Study and Characterisation of Access Control Model" 8, no (), (2018):
7-7.
Oyeyinka,F. and IDOWU,S. and Kuyoro,S. and Joshua,J. and Debo,A. and EZE,M. and EBIESUWA,O. and .
(2018). A Critical Comparative Study and Characterisation of Access Control Model, 8
(), pp7-7.
OyeyinkaF, IDOWUS, KuyoroS, JoshuaJ, DeboA, EZEM, EBIESUWAO, .
A Critical Comparative Study and Characterisation of Access Control Model. 2018, 8
():7-7.
Oyeyinka,Felicia ,
IDOWU,Sunday ,
Kuyoro,Shade ,
Joshua,Jonah Vincent ,
Debo,Akinsanya ,
EZE,Monday ,
and EBIESUWA,Oluwaseun
.
"A Critical Comparative Study and Characterisation of Access Control Model", 8 . (2018) :
7-7.
[1]
O.Felicia I.Sunday K.Shade J.Jonah Vincent D.Akinsanya E.Monday & E.Oluwaseun ,
"A Critical Comparative Study and Characterisation of Access Control Model"
vol.8,
no.,
pp. 7-7,
2018.