Abstract
Access control management systems play a crucial role in the infrastructure of cloud computing, relying on providing and managing access to computer resources. These systems employ strict access control procedures to guarantee the security and privacy of data. Service providers have the authority to establish and implement access policies, giving individuals and entities certain permissions. This entails confirming user identities, assigning the proper rights, and keeping an eye on activity via tracking and evaluating. An overview of the access control concept is given in this study, with an emphasis on role-based access control. It provides a thorough explanation of this kind of access control system and presents a few recent examples of how this idea is being used in successful works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohammed, S.J., Taha, D.B.: From cloud computing security towards homomorphic encryption: a comprehensive review. TELKOMNIKA (Telecommunication Computing Electronics and Control) 19(4), 1152–1161 (2021)
Sun, P.: Security and privacy protection in cloud computing: Discussions and challenges. J. Netw. Comput. Appl. 160, 102642 (2020)
Verma, D.K., Sharma, T.: Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Commun. Eng. 8, 188–195 (2019)
Puri, G.S., Tiwary, R., Shukla, S.: A review on cloud computing. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE (2019)
Yan, L., Hao, X., Cheng, Z., Zhou, R.: Cloud computing security and privacy. In: Proceedings of the 2018 International Conference on Big Data and Computing, pp. 119–123 (2018). https://doi.org/10.1145/3220199.3220217
Mohammed, S.J., Taha, D.B.: Privacy preserving algorithm using Chao-Scattering of partial homomorphic encryption. In: Journal of Physics: Conference Series, Vol. 1963, No. 1, p. 012154. IOP Publishing (2021)
Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)
Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76, 9493–9532 (2020)
Kumar, G.: A review on data protection of cloud computing security, benefits, risks and suggestions. United Int. J. Res. Technol. 1(2), 26–34 (2019)
Ahmed, I.: A brief review: security issues in cloud computing and their solutions. TELKOMNIKA Telecommunication, Computing, Electronics and Control 17(6), 2812–2817 (2019). https://doi.org/10.12928/telkomnika.v17i6.12490
Basu, S., Bardhan, A., Gupita, K., Saha, P.: Cloud computing security challenges & solutions-a survey. In: IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 347–356 (2018). https://doi.org/10.1109/CCWC.2018.8301700
Mohammed, S.J., Taha, D.B.: Paillier cryptosystem enhancement for Homomorphic Encryption technique. Multimedia Tools and Applications, 1–13 (2023)
Mohammed, S.J., Taha, D.B.: Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms. In: 2022 International Conference on Computer Science and Software Engineering (CSASE), pp. 89–94. IEEE (2022)
Gill, S.H., et al.: Security and privacy aspects of cloud computing: a smart campus case study. Intell. Autom. Soft Comput. 31(1), 117–128 (2022)
El Sibai, R., et al.: A survey on access control mechanisms for cloud computing. Trans. Emerg. Telecommun. Technolo. 31(2), e3720 (2020)
Mahmood, N.Z., Ahmed, S.R., Al-Hayaly, A.F., Algburi, S., Rasheed, J.: The evolution of administrative information systems: assessing the revolutionary impact of artificial intelligence. In: 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–7. Ankara, Turkiye (2023)
Sifou, F., Kartit, A., Hammouch, A.: Different access control mechanisms for data security in cloud computing. In: Proceedings of the 2017 International Conference on Cloud and Big Data Computing (2017)
Agrawal, N., Tapaswi, S.: A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mobile Comput. 52, 13–28 (2019)
Charanya, R., Aramudhan, M.: Survey on access control issues in cloud computing. In: 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 1–4. Pudukkottai, India (2016). https://doi.org/10.1109/ICETETS.2016.7603014
Ahmed, S.R., Ahmed, A.K., Jwmaa, S.J.: Analyzing the employee turnover by using decision tree algorithm. In: 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2023)
Cai, F., Zhu, N., He, J., et al.: Survey of access control models and technologies for cloud computing. Cluster Comput 22(Suppl 3), 6111–6122 (2019)
Kashmar, N., Adda, M., Atieh, M.: From access control models to access control metamodels: a survey. In: Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2. Springer International Publishing (2020)
Xu, J., et al.: Role-based access control model for cloud storage using identity-based cryptosystem. Mobile Netw. Appl. 26, 1475–1492 (2021)
O’Connor, A., Loomis, R.: Economic analysis of role-based access control (No. RTI Project Number 0211876), p. 132. RTI International (2010)
Uddin, M., Islam, S., Al-Nemrat, A.: A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access 7, 166676–166689 (2019)
Harnal, S., Chauhan, R.K.: Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud. EAI Endorsed Trans. Scalable Info. Sys. 7(26), e1–e1 (2020)
Alshamsi, A.S., Maamar, Z., Kuhail, M.-A.: Towards an approach for weaving open digital rights language into role-based access control. In: 2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD). IEEE (2023)
Wang, W., et al.: The design of a trust and role based access control model in cloud computing. In: 2011 6th International conference on pervasive computing and applications. Ieee (2011)
Dongdong, L., et al.: Role-based access control in educational administration system. In: MATEC Web of Conferences. Vol. 139. EDP Sciences (2017)
Bouadjemi, A., Abdi, M.K.: Towards an extension of RBAC model. Int. J. Comput. Digi. Sys. 10, 1–11 (2020)
Huang, H., et al.: Handling least privilege problem and role mining in RBAC. Journal of Combinatorial Optimization 30, 63–86 (2015)
Aftab, M.U., et al.: Permission-based separation of duty in dynamic role-based access control model. Symmetry 11(5), 669 (2019)
Lu, S., et al.: Implementing web-based e-Health portal systems. Department of Computer Science and CIISE. Concordia University (2017)
Abdulateef, O.G., Abdullah, A.I., Ahmed, S.R., Mahdi, M.S.: Vehicle license plate detection using deep learning. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)
Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. Paphos, Cyprus (2011). https://doi.org/10.1109/CIT.2011.36
Tang, Z., et al.: A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing: 7th International Conference, GPC 2012, Hong Kong, China, May 11–13, 2012. Proceedings 7. Springer Berlin Heidelberg (2012)
Uzun, E., et al.: Analyzing temporal role based access control models. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies (2012)
Ferrara, A.L., et al.: Vac-verifier of administrative role-based access control policies. In: Computer Aided Verification: 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18–22, 2014. Proceedings 26. Springer International Publishing (2014)
Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (2013). https://doi.org/10.1109/TIFS.2013.2286456
Ranise, S., Truong, A., Viganò, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing (2015)
Yaseen, B.T., Kurnaz, S., Ahmed, S.R.: Detecting and classifying drug interaction using data mining techniques. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)
Huang, L., Xiong, Z., Wang, G.: A trust-role access control model facing cloud computing. In: 2016 35th Chinese Control Conference (CCC). IEEE (2016)
Ghafoorian, M., Abbasinezhad-Mood, D., Shakeri, H.: A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans. Parallel Distrib. Syst. 30(4), 778–788 (2018)
Shahen, J., Niu, J., Tripunitara, M.: Cree: a performant tool for safety analysis of administrative temporal role-based access control (ATRBAC) policies. IEEE Trans. Dependable Secure Comput. 18(5), 2349–2364 (2019)
Baig, U., et al.: Secure role based access control data sharing approach and cloud environment. IRJMETS (International Research Journal of Modernization in Engineering Technology and Science) 5(3), 7.868 (2023)
Acknowledgements
The authors are very grateful to the University of Mosul/College of Computer Science and Mathematics for their facilities, which helped improve the quality of this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mohammed, A.J., Mohammed, S.J. (2024). Securing Cloud Computing Using Access Control Systems: A Comprehensive Review. In: Rasheed, J., Abu-Mahfouz, A.M., Fahim, M. (eds) Forthcoming Networks and Sustainability in the AIoT Era. FoNeS-AIoT 2024. Lecture Notes in Networks and Systems, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-031-62881-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-62881-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-62880-1
Online ISBN: 978-3-031-62881-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)