A Systematic Review of Access Control Models: Background, Existing Research, and Challenges

Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While rob...

Full description

Saved in:
Bibliographic Details
Main Authors: Nastaran Farhadighalati, Luis A. Estrada-Jimenez, Sanaz Nikghadam-Hojjati, Jose Barata
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10850915/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832576778408820736
author Nastaran Farhadighalati
Luis A. Estrada-Jimenez
Sanaz Nikghadam-Hojjati
Jose Barata
author_facet Nastaran Farhadighalati
Luis A. Estrada-Jimenez
Sanaz Nikghadam-Hojjati
Jose Barata
author_sort Nastaran Farhadighalati
collection DOAJ
description Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. In access control models, there is a general lack of a comprehensive cross-domain overview, insufficient focus on evolving access control requirements, and inadequate analysis of challenges and issues. This paper comprehensively analyzes access control models (ACMs) through a two-pronged approach. First, we conduct a Narrative Literature Review(NLR) to classify traditional ACMs, evaluating their security strengths and weaknesses and compatible security protocols. Second, we perform a Systematic Literature Review (SLR) of emerging ACMs developed over the past decade across various domains. This systematic review has three primary objectives: (1) to introduce and analyze these emerging ACMs, (2) to present their current technological status, and (3) to identify key challenges and promising research directions. By combining these approaches, this paper offers a comprehensive overviewofACMapplications and techniques, identifies existing challenges, and explores future research directions to guide advancements in access control.
format Article
id doaj-art-b61f12ae388d46b78827cf4f0439e8c7
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-b61f12ae388d46b78827cf4f0439e8c72025-01-31T00:01:20ZengIEEEIEEE Access2169-35362025-01-0113177771780610.1109/ACCESS.2025.353314510850915A Systematic Review of Access Control Models: Background, Existing Research, and ChallengesNastaran Farhadighalati0https://orcid.org/0000-0002-1578-0711Luis A. Estrada-Jimenez1https://orcid.org/0000-0001-8595-3713Sanaz Nikghadam-Hojjati2https://orcid.org/0000-0002-0839-9250Jose Barata3https://orcid.org/0000-0002-6348-1847NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalData security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. In access control models, there is a general lack of a comprehensive cross-domain overview, insufficient focus on evolving access control requirements, and inadequate analysis of challenges and issues. This paper comprehensively analyzes access control models (ACMs) through a two-pronged approach. First, we conduct a Narrative Literature Review(NLR) to classify traditional ACMs, evaluating their security strengths and weaknesses and compatible security protocols. Second, we perform a Systematic Literature Review (SLR) of emerging ACMs developed over the past decade across various domains. This systematic review has three primary objectives: (1) to introduce and analyze these emerging ACMs, (2) to present their current technological status, and (3) to identify key challenges and promising research directions. By combining these approaches, this paper offers a comprehensive overviewofACMapplications and techniques, identifies existing challenges, and explores future research directions to guide advancements in access control.https://ieeexplore.ieee.org/document/10850915/Access control (AC)access control model (ACM)securitydatarequirements
spellingShingle Nastaran Farhadighalati
Luis A. Estrada-Jimenez
Sanaz Nikghadam-Hojjati
Jose Barata
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
IEEE Access
Access control (AC)
access control model (ACM)
security
data
requirements
title A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
title_full A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
title_fullStr A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
title_full_unstemmed A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
title_short A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
title_sort systematic review of access control models background existing research and challenges
topic Access control (AC)
access control model (ACM)
security
data
requirements
url https://ieeexplore.ieee.org/document/10850915/
work_keys_str_mv AT nastaranfarhadighalati asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT luisaestradajimenez asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT sanaznikghadamhojjati asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT josebarata asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT nastaranfarhadighalati systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT luisaestradajimenez systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT sanaznikghadamhojjati systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges
AT josebarata systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges