6 Conclusion
Access control is an important information security technology and has become indispensable for enterprises to protect data and resources in information systems. After many years of development, research on access control models has achieved noticeable progress. Cloud computing is a new paradigm, making access control critical in providing effective protection to cloud computing resources. This makes access control in cloud computing one of the most important issues in present research on cloud security. Therefore, a great deal of attention has been attracted from academia and industry. However, its characteristics of virtualization, distribution and multi-tenancy have brought many challenges to the development of access control technologies. In addition, access control in cloud computing is not just a technical problem, it also involves a lot of aspects such as standardization, laws and regulations, codes of conduct, etc. At present, research of cloud computing access control technologies is still in its early stage. Future studies should therefore emphasize more on the design of cloud access control models as well as on policy analysis and consistency analysis of access control in addition to other key technologies.
This paper investigated common access control mechanisms and reviewed some traditional access control models and technologies as well as the framework of access control for cloud computing. This paper also discussed research progress of access control in recent years and pointed out some key issues for future research on cloud access control. We hope that the discussion on challenges and issues of cloud computing access control would bring benefit to the future research.