Key based Access Control Policies to Solve Security in Cloud Data Sharing
نویسندگان
چکیده
منابع مشابه
Access Control Based Data Security in Cloud Computing
Cloud Computing is mainly about offering services on pay per user basis. It provides Storage-as-aService, where data owner can store their data in the cloud. Data is biggest asset to an organization and how confidentiality, authentication and access control can be outsourced. There is a threat to data owner that if CSP (Cloud Service Provider) is malicious or has some vulnerability. This paper ...
متن کاملImproving Data Sharing Security in Cloud Computing
Cloud computing has emerged as a new computing paradigm where all IT infrastructure can be outsourced and working as on premise. It offers numerous advantages both for customers and providers and especially at the cost level that is typically low compared to buying your own resources, configuring and managing them. One of the tremendous services is the data sharing and the data storage. Custome...
متن کاملA Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features
A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy reencryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in...
متن کاملCapability-Based Access Control for Peer-to-Peer Data Sharing
This paper describes SharedViews, a peer-to-peer data management system that simplifies file organization and facilitates file sharing and protection among home users on the Internet. The key innovation of SharedViews is the integration of queries and dynamic views from database systems with a capability-based protection model from the operating systems world. Users organize their files using v...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Emerging Research in Management and Technology
سال: 2018
ISSN: 2278-9359
DOI: 10.23956/ijermt.v6i12.33