Design Access Control Model for the Cloud Computing Environment

Design Access Control Model for the Cloud Computing Environment

Authors

  • Bassam W. Aboshosha
  • Rabie A. Ramadan
  • Ayman El-Sayed
  • Mohamed M. Dessouky

Keywords:

Access control model, cloud computing, tokenization, access list

Abstract

Recently, cloud computing applications are growing very fast, with the increasing number of organizations that resorting to use or store resources in the Cloud, several challenges have been identified. Security is one of the most challenging aspects of Cloud Computing. Access control offers strong security for data and is considered as a major research area. A good access control model assures a secure cloud environment. This research aims to introduce a user profile based access control model in cloud computing environments and architecture.

Downloads

Published

2020-05-01

How to Cite

W. Aboshosha, B., A. Ramadan, . R., El-Sayed, A. ., & M. Dessouky, M. . (2020). Design Access Control Model for the Cloud Computing Environment: Design Access Control Model for the Cloud Computing Environment. WAS Science Nature (WASSN) ISSN: 2766-7715, 3(1). Retrieved from http://worldascience.com/journals/index.php/wassn/article/view/17

Issue

Section

Computer Science & Mathematics

Most read articles by the same author(s)