Abstract

Access control mechanisms define the level of access to the resources among specified users. It distinguishes the users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid access control models have been proposed in previous researches over the last few decades. In this study, we provide a detailed survey of access control models and compare the traditional and hybrid access control models based on their access control criteria. This survey focuses on the growing literature of access control models and summarizes it through comparative analysis, identifying limitations and illustrating the advantages of both traditional and hybrid models. This study will help the researchers to get a deep understanding of the traditional and hybrid access control models.

Highlights

  • Information is the most important asset of any organization that must be secure. e security of information can be ensured with the help of confidentiality, integrity, and availability [1, 2]

  • This study presents access control models and advanced hybrid access control models with their framework and applications in a comprehensive manner. e access control models are used in small and large organizations according to the pros and cons of the model and the requirements of the organization. is survey encourages the researchers to propose new hybrid access control models according to the problem

  • The access rights are limited to the owner of the resource, and ownership is restricted for that individual, in the strict discretionary access control (DAC) [17, 18]

Read more

Summary

Introduction

Information is the most important asset of any organization that must be secure. e security of information can be ensured with the help of confidentiality, integrity, and availability [1, 2]. E existing surveys on access control provide a review of basic access control models, i.e., MAC, DAC, RBAC, and ABAC, or focus on access control trends, i.e., IoT, cloud, and fog computing, but there is no comprehensive survey that explains advanced access control models with their framework and applications along with pros and cons. Ere are some existing survey studies on access control models that tried to explain access control policies with few models in specific contexts, i.e., IoT, cloud, and fog computing. Bertin et al [11] conduct a survey paper that explains the basic access control model in detail, but this study does not include advanced hybrid access control models. E author proposed a novel method for IoT that includes access control, network attack, and trusted computing, but this study does not explain the applications, limitations, pros, and cons of each model. Access Control e access control (AC) mechanism is used to permit or deny the access of resources within the organization to secure the data [6]. e AC permits the access of resources only to authorized personnel of the organization and denies the access of resources to unauthorized and other users. e access control is normally consisting of identification, authentication, and authorization. e access control grants access to authorized users according to user privilege level after authentication [15]. e access control is classified into traditional and hybrid models as shown in Figure 2. e traditional access control is further divided into four types: Section 1 Introduction

Conclusions and Future
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call