Securing Distributed Systems: A Survey on Access Control Techniques for Cloud, Blockchain, IoT and SDN

Lewis Golightly, Paolo Modesti, Rémi Garcia, Victor Chang*

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

Abstract

Access Control is a crucial defense mechanism organizations can deploy to meet modern cybersecurity needs and legal compliance with data privacy. The aim is to prevent unauthorized users and systems from accessing protected resources in a way that exceeds their permissions. The present survey aims to summarize state-of-the-art Access Control techniques, presenting recent research trends in this area. Moreover, as the cyber-attack landscape and zero-trust networking challenges require organizations to consider their Information Security management strategies carefully, in this study, we present a review of contemporary Access Control techniques and technologies being discussed in the literature and the various innovations and evolution of the technology. We also discuss adopting and applying different Access Control techniques and technologies in four upcoming and crucial domains: Cloud Computing, Blockchain, the Internet of Things, and Software-Defined Networking. Finally, we discuss the business adoption strategies for Access Control and how the technology can be integrated into a cybersecurity and network architecture strategy.
Original languageEnglish
Article number100015
Pages (from-to)100015
Number of pages60
JournalCyber Security and Applications
Volume1
Early online date15 Mar 2023
DOIs
Publication statusPublished - Dec 2023

Bibliographical note

Copyright © 2023 Published by Elsevier B.V. on behalf of KeAi Communications Co., Ltd. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/)

Keywords

  • Access control
  • Blockchain
  • Cloud
  • Distributed systems
  • IoT
  • SDN
  • Security

Fingerprint

Dive into the research topics of 'Securing Distributed Systems: A Survey on Access Control Techniques for Cloud, Blockchain, IoT and SDN'. Together they form a unique fingerprint.

Cite this