Evaluation of Access Control Techniques in Cloud Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control in Cloud Computing Environment

Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods ensure that authorized user’s access the data and the system. This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment. It leads...

متن کامل

Policy-based Access Control in Cloud Computing

Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User of the cloud outsourced their sensitive data and information to cloud provider’s...

متن کامل

DACD: Delegated Access Control of Data in Cloud computing environment

Cloud computing provides a service based on internet for several shared resources and system software across various environment. For secure cloud storage the process of encryption of the data to the users for various needs has been brought by the delegated access control method. Generally storage in public cloud requires high communication, heavy load due to maximum storage and high computatio...

متن کامل

Policy-based Framework for Access Control in Cloud Computing

One of the most challenging issue in cloud computing is access control and data security because User of the cloud outsourced their sensitive data and information to cloud provider’s servers which is not within the same trusted domain as data owner. Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent securi...

متن کامل

Capability-based Cryptographic Data Access Control in Cloud Computing

Chittaranjan Hota, Sunil Sanka Department of Computer Science & Information Systems, BITS Pilani Hyderabad Campus, Hyderabad Email: [email protected], [email protected] Muttukrishnan Rajarajan Information Security Group, School of Engineering & Mathematical Sciences, City University, London Email: [email protected] Srijith K. Nair Security Futures Practice, BT Innovate and De...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2020

ISSN: 0975-8887

DOI: 10.5120/ijca2020920130