The Evolution of Access Control in Cloud Security: A Survey of Key Literature

Main Article Content

K. Raja, K. Sujith

Abstract

Cloud Computing is a distributed model that enables users to access, meet and exchange resources and resource requirements hosted by various service providers. Authentication of requesting users and the permitting of their rights of access are extremely necessary in order to avoid unauthorised or unlawful access to cloud services. In the cloud scenario, access control of distributed resources is most critical. Access control is a basic aspect of the security of information that is directly linked to the fundamental features of confidentiality, honesty and availability. This article provides a literature analysis of the Cloud Computing Access Control Mechanism.

Article Details

How to Cite
K. Raja, et al. (2023). The Evolution of Access Control in Cloud Security: A Survey of Key Literature. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 1122–1125. https://doi.org/10.17762/ijritcc.v11i9.9020
Section
Articles
Author Biography

K. Raja, K. Sujith

K. Raja1, Dr. K. Sujith2

1Research Scholar, Department of Computer Science, Annai College of Arts & Science (Affiliated to Bharathidasan University, Tiruchirappalli), Kovilacheri, Kumbakonam, Tamilnadu, India.

2Associate Professor, Department of Computer Science, Annai College of Arts & Science (Affiliated to Bharathidasan University, Tiruchirappalli), Kovilacheri, Kumbakonam, Tamilnadu, India.