Analysis of Access Control Methods employed on the Private Cloud : Literature Review
Aswani, Kush (2025)
Aswani, Kush
2025
Tieto- ja sähkötekniikan kandidaattiohjelma - Bachelor's Programme in Computing and Electrical Engineering
Informaatioteknologian ja viestinnän tiedekunta - Faculty of Information Technology and Communication Sciences
Hyväksymispäivämäärä
2025-06-03
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-202505316453
https://urn.fi/URN:NBN:fi:tuni-202505316453
Tiivistelmä
In recent years, cloud computing has been adopted as the standard solution for organizations to deploy their applications and manage tasks. Common deployment models for cloud computing are Public, Private, Hybrid, and Community. Private deployment models are known for requiring higher initial capital than other deployment models, at the benefit for flexibility as well as improved security. Despite this security improvement, the vulnerabilities in the commonly used access control implementations and the security risks of access control models may hinder further adoption of cloud computing. This paper provides background on commonly used implementations and views the literature on their vulnerabilities and solutions. These solutions are analyzed to view feasibility in implementation. Finally, recommendations are provided for future studies on access control solutions.
Kokoelmat
- Kandidaatintutkielmat [10016]