A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While rob...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10850915/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832576778408820736 |
---|---|
author | Nastaran Farhadighalati Luis A. Estrada-Jimenez Sanaz Nikghadam-Hojjati Jose Barata |
author_facet | Nastaran Farhadighalati Luis A. Estrada-Jimenez Sanaz Nikghadam-Hojjati Jose Barata |
author_sort | Nastaran Farhadighalati |
collection | DOAJ |
description | Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. In access control models, there is a general lack of a comprehensive cross-domain overview, insufficient focus on evolving access control requirements, and inadequate analysis of challenges and issues. This paper comprehensively analyzes access control models (ACMs) through a two-pronged approach. First, we conduct a Narrative Literature Review(NLR) to classify traditional ACMs, evaluating their security strengths and weaknesses and compatible security protocols. Second, we perform a Systematic Literature Review (SLR) of emerging ACMs developed over the past decade across various domains. This systematic review has three primary objectives: (1) to introduce and analyze these emerging ACMs, (2) to present their current technological status, and (3) to identify key challenges and promising research directions. By combining these approaches, this paper offers a comprehensive overviewofACMapplications and techniques, identifies existing challenges, and explores future research directions to guide advancements in access control. |
format | Article |
id | doaj-art-b61f12ae388d46b78827cf4f0439e8c7 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2025-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-b61f12ae388d46b78827cf4f0439e8c72025-01-31T00:01:20ZengIEEEIEEE Access2169-35362025-01-0113177771780610.1109/ACCESS.2025.353314510850915A Systematic Review of Access Control Models: Background, Existing Research, and ChallengesNastaran Farhadighalati0https://orcid.org/0000-0002-1578-0711Luis A. Estrada-Jimenez1https://orcid.org/0000-0001-8595-3713Sanaz Nikghadam-Hojjati2https://orcid.org/0000-0002-0839-9250Jose Barata3https://orcid.org/0000-0002-6348-1847NOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalNOVA School of Science and Technology, Center of Technology and Systems (UNINOVA-CTS), Lisbon, PortugalData security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. In access control models, there is a general lack of a comprehensive cross-domain overview, insufficient focus on evolving access control requirements, and inadequate analysis of challenges and issues. This paper comprehensively analyzes access control models (ACMs) through a two-pronged approach. First, we conduct a Narrative Literature Review(NLR) to classify traditional ACMs, evaluating their security strengths and weaknesses and compatible security protocols. Second, we perform a Systematic Literature Review (SLR) of emerging ACMs developed over the past decade across various domains. This systematic review has three primary objectives: (1) to introduce and analyze these emerging ACMs, (2) to present their current technological status, and (3) to identify key challenges and promising research directions. By combining these approaches, this paper offers a comprehensive overviewofACMapplications and techniques, identifies existing challenges, and explores future research directions to guide advancements in access control.https://ieeexplore.ieee.org/document/10850915/Access control (AC)access control model (ACM)securitydatarequirements |
spellingShingle | Nastaran Farhadighalati Luis A. Estrada-Jimenez Sanaz Nikghadam-Hojjati Jose Barata A Systematic Review of Access Control Models: Background, Existing Research, and Challenges IEEE Access Access control (AC) access control model (ACM) security data requirements |
title | A Systematic Review of Access Control Models: Background, Existing Research, and Challenges |
title_full | A Systematic Review of Access Control Models: Background, Existing Research, and Challenges |
title_fullStr | A Systematic Review of Access Control Models: Background, Existing Research, and Challenges |
title_full_unstemmed | A Systematic Review of Access Control Models: Background, Existing Research, and Challenges |
title_short | A Systematic Review of Access Control Models: Background, Existing Research, and Challenges |
title_sort | systematic review of access control models background existing research and challenges |
topic | Access control (AC) access control model (ACM) security data requirements |
url | https://ieeexplore.ieee.org/document/10850915/ |
work_keys_str_mv | AT nastaranfarhadighalati asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT luisaestradajimenez asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT sanaznikghadamhojjati asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT josebarata asystematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT nastaranfarhadighalati systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT luisaestradajimenez systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT sanaznikghadamhojjati systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges AT josebarata systematicreviewofaccesscontrolmodelsbackgroundexistingresearchandchallenges |