Trusted Access Control: Securing Data with Proper Authorization

By: Kwok Tai Chui, Hong Kong Metropolitan University (HKMU) , Hong Kong, Email:

In today’s digital age, data breaches and cyber-attacks are becoming increasingly common. One of the main reasons for this is the need for proper access control measures in place [1-5]. Trusted access control is a vital aspect of cybersecurity that helps organizations protect their sensitive data by ensuring that only authorized personnel can access it [6-11]. This blog post will explore the principles of trusted access control and its benefits for organizations.

What is Trusted Access Control?

Trusted access control is a security mechanism that ensures that only authorized personnel can access sensitive data. This is achieved by establishing a set of rules and procedures that govern who can access data, how they can access it, and what they can do with it [12-16].

Trusted access control can be implemented through various technologies, such as access control lists, identity and access management (IAM) solutions, and multi-factor authentication [17-22].

Benefits of Trusted Access Control

The benefits of trusted access control include:

  1. Improved Data Security: Trusted access control ensures that sensitive data is only accessible to authorized personnel, reducing the risk of data breaches and cyber-attacks.
  2. Compliance: Trusted access control helps organizations comply with regulatory requirements, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).
  3. Reduced Insider Threats: Trusted access control reduces the risk of insider threats by limiting access to sensitive data to only authorized personnel.
  4. Improved Productivity: Trusted access control enables employees to access the data they need to perform their jobs while protecting sensitive data.

Implementing Trusted Access Control

Implementing trusted access control requires a well-defined plan that includes defining access policies, identifying the roles and responsibilities of employees, and selecting the appropriate technology solutions. Organizations can work with a reputable cybersecurity provider to develop and implement customized trusted access control solutions.


Trusted access control is vital to cybersecurity that helps organizations protect their sensitive data. By establishing a set of rules and procedures that govern who can access data, how they can access it, and what they can do with it, organizations can improve data security, comply with regulatory requirements, reduce insider threats, and improve productivity [23-27]. Implementing trusted access control requires a well-defined plan and appropriate technology solutions, which can be developed and implemented with the help of a reputable cybersecurity provider.


  1. Huang, H., Zhang, J., Hu, J., Fu, Y., & Qin, C. (2022). Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem. IEEE Transactions on Information Forensics and Security17, 3306-3320.
  2. Sandhu, R., & Zhang, X. (2005, June). Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 147-158).
  3. Chong, D. J., & Deng, R. H. (2006, October). Privacy-enhanced superdistribution of layered content with trusted access control. In Proceedings of the ACM workshop on Digital rights management (pp. 37-44).
  4. Plageras, A. P., et al., (2018). Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings. Future Generation Computer Systems82, 349-357.
  5. Yue-Qin, F., & Yong-Sheng, Z. (2015, November). Trusted Access Control model based on role and task in cloud computing. In 2015 7th International Conference on Information Technology in Medicine and Education (ITME) (pp. 710-713). IEEE.
  6. Memos, V. A., et al., (2018). An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Generation Computer Systems83, 619-628.
  7. Abrams, M. D., & Joyce, M. V. (1995). Trusted system concepts. Computers & Security14(1), 45-56.
  8. Yu, C., Li, J., Li, X., Ren, X., & Gupta, B. B. (2018). Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications77(4), 4585-4608.
  9. Jordan, C. S. (1987). Guide to Understanding Discretionary Access Control in Trusted Systems. DIANE Publishing.
  10. Li, D.,et al., (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences479, 432-447.
  11. Al Breiki, H., Al Qassem, L., Salah, K., Rehman, M. H. U., & Sevtinovic, D. (2019, November). Decentralized access control for IoT data using blockchain and trusted oracles. In 2019 IEEE International Conference on Industrial Internet (ICII) (pp. 248-257). IEEE.
  12. Alsmirat, M. A., et al., (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications78(3), 3649-3688.
  13. Sarojini, G., Vijayakumar, A., & Selvamani, K. (2016). Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloudProcedia Computer Science92, 506-512.
  14. Wang, H., Li, Z., Li, Y., Gupta, B. B., & Choi, C. (2020). Visual saliency guided complex image retrievalPattern Recognition Letters130, 64-72.
  15. Fan, Y., Liu, S., Tan, G., & Qiao, F. (2020). Fine-grained access control based on trusted execution environment. Future Generation Computer Systems109, 551-561.
  16. Al-Qerem, A., et al., (2020). IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Computing24(8), 5695-5711.
  17. Chen, H. C. (2016). A trusted user-to-role and role-to-key access control scheme. Soft Computing20(5), 1721-1733.
  18. Gupta, B. B., & Quamara, M. (2020). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience32(21), e4946.
  19. Notargiacomo, L. (1996, December). Role-based access control in ORACLE7 and trusted ORACLE7. In Proceedings of the first ACM Workshop on Role-based access control (pp. 17-es).
  20. Mishra, A., et al.,(2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems77(1), 47-62.
  21. Zhang, X., Covington, M. J., Chen, S., & Sandhu, R. (2007, March). SecureBus: towards application-transparent trusted computing with mandatory access control. In Proceedings of the 2nd ACM symposium on Information, computer and communications security (pp. 117-126).
  22. Nguyen, G. N., et al., (2021). Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of parallel and distributed computing153, 150-160.
  23. Bouazzouni, M. A., Conchon, E., Peyrard, F., & Bonnefoi, P. F. (2016, July). Trusted Access Control System for Smart Campus. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 1006-1012). IEEE.
  24. Sahoo, S. R., & Gupta, B. B. (2021). Multiple features based approach for automatic fake news detection on social networks using deep learning. Applied Soft Computing100, 106983.
  25. Sandhu, R., Zhang, X., Ranganathan, K., & Covington, M. J. (2006). Client-side access control enforcement using trusted computing and pei models. Journal of High Speed Networks15(3), 229-245.
  26. Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., & Hsu, C. H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems22(7), 4757-4769.
  27. Bente, I., & von Helden, J. (2009). Towards trusted network access control. In Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008 (pp. 157-167). Vieweg+ Teubner.

Cite As:

K.T. Chui (2023) Trusted Access Control: Securing Data with Proper Authorization, Insights2techinfo , pp.1

49140cookie-checkTrusted Access Control: Securing Data with Proper Authorization
Share this:

Leave a Reply

Your email address will not be published.