A systematic review on blockchain-based access control systems in cloud environment

A Punia, P Gulia, NS Gill, E Ibeke, C Iwendi… - Journal of Cloud …, 2024 - Springer
The widespread adoption of cloud computing has dramatically altered how data is stored,
processed, and accessed in an era. The rapid development of digital technologies …

A Systematic Review of Access Control Models: Background, Existing Research, and Challenges

N Farhadighalati, LA Estrada-Jimenez… - IEEE …, 2025 - ieeexplore.ieee.org
Data security has become paramount, especially with the exponential growth of data, the
rise of cyber threats, and the increasing prevalence of remote work. Protecting data …

Blockchain empowered dynamic access control for secure data sharing in collaborative emergency management

Q Wang, Y Liu - Information Processing & Management, 2025 - Elsevier
In the realm of emergency management involving multi-party collaboration, securely sharing
data among multiple entities poses a significant challenge. Traditional centralized data …

An access control model based on system security risk for dynamic sensitive data storage in the cloud

N Alharbe, A Aljohani, MA Rakrouki, M Khayyat - Applied Sciences, 2023 - mdpi.com
In cloud computing, dynamic storage of data generated by users, applications, tasks,
workflows, etc. requires frequent access operations, so traditional encryption cannot be …

An efficient hybrid fuzzy image encryption models for the secured cloud accessing in portable robotics devices

KS Reddy, KR Prasad, KN Reddy, P Anjaiah - Soft Computing, 2023 - Springer
Secure sharing of image data through different communication channels is a challenging
research issue in digital networks. In such cases, cryptography algorithms are widely used to …

A Survey on Cloud Storage System Security via Encryption Mechanisms

W Alsuwat, H Alsuwat - … Journal of Computer Science & Network …, 2022 - koreascience.kr
Cloud computing is the latest approach that is developed for reducing the storage of space
to store the data and helps the quick sharing of the data. An increase in the cloud computing …

[PDF][PDF] Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure.

A Liu, N Wang, X Du, D Shan, X Wu… - Computers, Materials & …, 2024 - cdn.techscience.cn
Big data resources are characterized by large scale, wide sources, and strong dynamics.
Existing access control mechanisms based on manual policy formulation by security experts …

Towards a Zero Trust Based Hybrid Access Control Model for Medical Data

C Wilcox, K Welsh, S Djahel, N Costen… - … on Information and …, 2024 - ieeexplore.ieee.org
This paper addresses some of the limitations of current hybrid access control models, in
particular the issues surrounding managed rights inheritance, a model's consistency and its …

Access Control in Mobile Crowdsensing: Requirements, Challenges and Open Issues

H El Gadi, H El Bakkali, D Benhaddou… - Science and Information …, 2023 - Springer
Many industries, including smart cities, healthcare, and others, have undergone radical
change due to the fast-growing number of smart devices and associated sensors. Mobile …

From Passive Defense to Proactive Defence: Strategies and Technologies

C Shi, J Peng, S Zhu, X Ren - … on Artificial Intelligence Security and Privacy, 2023 - Springer
The goal of network defense mechanisms is to enable systems to actively detect and
withstand attacks, reduce reliance on external security measures, and quickly recover and …