Maintaining access control in a cross cloud environment with a growing user base presents significant challenge. The effectiveness of cloud computing today heavily depends on the ability to share resources efficiently. While data and service sharing are crucial for collaborative endeavors, maintaining security in identity and access management within this context is complex. Various issues arise, such as the incompatibility, dynamic user groups, risk of a single point of failure and establishing trust. Although significant research has been conducted, several challenges remain unresolved. This article categorizes the challenges associated with access control and provides relevant background information. It also assesses various studies and projects, highlighting their strengths and weaknesses. It explores traditional approaches like Attribute-Based Encryption (ABE) schemes and Identity federation frameworks, in addition to more advanced methods, including block chain and AI/ML-driven access management. A comparative analysis of these studies is presented to illustrate their differences and similarities.
Key words: Access Control, Cloud computing, Security and Privacy
|