The Evolution of Access Control in Cloud Security: A Survey of Key Literature
Main Article Content
Abstract
Cloud Computing is a distributed model that enables users to access, meet and exchange resources and resource requirements hosted by various service providers. Authentication of requesting users and the permitting of their rights of access are extremely necessary in order to avoid unauthorised or unlawful access to cloud services. In the cloud scenario, access control of distributed resources is most critical. Access control is a basic aspect of the security of information that is directly linked to the fundamental features of confidentiality, honesty and availability. This article provides a literature analysis of the Cloud Computing Access Control Mechanism.
Article Details
How to Cite
K. Raja, et al. (2023). The Evolution of Access Control in Cloud Security: A Survey of Key Literature. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 1122–1125. https://doi.org/10.17762/ijritcc.v11i9.9020
Issue
Section
Articles