A Critical Comparative Study and Characterisation of Access Control Model (ACM)

A Critical Comparative Study and Characterisation of Access Control Model (ACM)

Author by Dr. Oluwaseun Ebiesuwa

Journal/Publisher: International Journal Of Computer & Organization Trends

Volume/Edition: 8

Language: English

Pages: 7 - 17

Abstract

This paper reviews access control methods
as they relate to cloud computing. Although
advantages of cloud computing over traditional
computing techniques cannot be overemphasised;
cloud computing presents new security challenges
which traditional access control method may not be
able to handle, hence proposed access control
methods for cloud computing were reviewed and the
drawback of each method highlighted. A
characterisation of the access control methods was
attempted using the various features discussed in
literature and comparison of the characteristics was
done. From the analysis, features of RBAC and
ABAC are the best among the Access Control
methods but both has weaknesses in confidentiality
and integrity. ABAC was also shown to be very
complex. Hence it was suggested that research efforts
should be concentrated in building ABAC model that
is more secure and easy to implement.


Other Co-Authors