Cargando…

Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study

Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when desi...

Descripción completa

Detalles Bibliográficos
Autores principales: Rahaman, Md Shahidur, Tisha, Sadia Nasrin, Song, Eunjee, Cerny, Tomas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098865/
https://www.ncbi.nlm.nih.gov/pubmed/37050474
http://dx.doi.org/10.3390/s23073413
_version_ 1785024916778647552
author Rahaman, Md Shahidur
Tisha, Sadia Nasrin
Song, Eunjee
Cerny, Tomas
author_facet Rahaman, Md Shahidur
Tisha, Sadia Nasrin
Song, Eunjee
Cerny, Tomas
author_sort Rahaman, Md Shahidur
collection PubMed
description Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when designing and enforcing access decisions for a gigantic scalable application. It is sometimes complicated to choose the potential access control model for the system. Cloud-native software architecture has become an integral part of the industry to manage and maintain customer needs. A microservice is a combination of small independent services that might have hundreds of parts, where the developers must protect the individual services. An efficient access control model can defend the respective services and consistency. This study intends to comprehensively analyze the current access control mechanism and techniques utilized in cloud-native architecture. For this, we present a systematic mapping study that extracts current approaches, categorizes access control patterns, and provides developers guidance to meet security principles. In addition, we have gathered 234 essential articles, of which 29 have been chosen as primary studies. Our comprehensive analysis will guide practitioners to identify proper access control mechanisms applicable to ensuring security goals in cloud-native architectures.
format Online
Article
Text
id pubmed-10098865
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100988652023-04-14 Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study Rahaman, Md Shahidur Tisha, Sadia Nasrin Song, Eunjee Cerny, Tomas Sensors (Basel) Review Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when designing and enforcing access decisions for a gigantic scalable application. It is sometimes complicated to choose the potential access control model for the system. Cloud-native software architecture has become an integral part of the industry to manage and maintain customer needs. A microservice is a combination of small independent services that might have hundreds of parts, where the developers must protect the individual services. An efficient access control model can defend the respective services and consistency. This study intends to comprehensively analyze the current access control mechanism and techniques utilized in cloud-native architecture. For this, we present a systematic mapping study that extracts current approaches, categorizes access control patterns, and provides developers guidance to meet security principles. In addition, we have gathered 234 essential articles, of which 29 have been chosen as primary studies. Our comprehensive analysis will guide practitioners to identify proper access control mechanisms applicable to ensuring security goals in cloud-native architectures. MDPI 2023-03-24 /pmc/articles/PMC10098865/ /pubmed/37050474 http://dx.doi.org/10.3390/s23073413 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Rahaman, Md Shahidur
Tisha, Sadia Nasrin
Song, Eunjee
Cerny, Tomas
Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title_full Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title_fullStr Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title_full_unstemmed Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title_short Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
title_sort access control design practice and solutions in cloud-native architecture: a systematic mapping study
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098865/
https://www.ncbi.nlm.nih.gov/pubmed/37050474
http://dx.doi.org/10.3390/s23073413
work_keys_str_mv AT rahamanmdshahidur accesscontroldesignpracticeandsolutionsincloudnativearchitectureasystematicmappingstudy
AT tishasadianasrin accesscontroldesignpracticeandsolutionsincloudnativearchitectureasystematicmappingstudy
AT songeunjee accesscontroldesignpracticeandsolutionsincloudnativearchitectureasystematicmappingstudy
AT cernytomas accesscontroldesignpracticeandsolutionsincloudnativearchitectureasystematicmappingstudy