A Critical Comparative Study and Characterisation of Access Control Model

A Critical Comparative Study and Characterisation of Access Control Model

Author by Oyeyinka Felicia

Journal/Publisher: International Journal Of Computer & Organization Trends (ijcot)

Volume/Edition: 8

Language: English

Pages: 7 - 17

Abstract

This paper reviews access control methods as they relate to cloud computing. Although advantages of cloud computing over traditional computing techniques cannot be overemphasised; cloud computing presents new security challenges which traditional access control method may not be able to handle, hence proposed access control methods for cloud computing were reviewed and the drawback of each method highlighted. A characterisation of the access control methods was attempted using the various features discussed in literature and comparison of the characteristics was done. From the analysis, features of RBAC and ABAC are the best among the Access Control methods but both has weaknesses in confidentiality and integrity. ABAC was also shown to be very complex. Hence it was suggested that research efforts should be concentrated in building ABAC model that is more secure and easy to implement.


Other Co-Authors