A Modified Things Role Based Access Control Model for Securing Utilities in Cloud Computing

Cloud computing introduces a radical change in computer resources services that may become the best service provider at a reduced cost to the users. In spite of all the advantages of cloud computing, there are a lots of security challenges that come with its implementation. In overcoming these challenges, there are many access control models proposed in literature; these include discretionary access control, mandatory access control and role based access control. Role based access control models use role hierarchies and constraints. Administrative roles can be designated to manage other roles.

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Resource Details

Provided by:
International Journal of Innovative Research in Information Security (IJIRIS)
Topic:
Hardware
Format:
PDF