A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control Management for Secure Cloud Storage

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

متن کامل

A New and Effective Data Access Control Using Secure Verifiable Authority in Cloud Storage

Data access control is an efficient way to provide the data security in the cloud but due to data outsourcing over untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Attribute-based Encryption (ABE) technique is regarded as a most trustworthy cryptographic conducting tool to guarantee data owner’s direct control on their data in public cloud s...

متن کامل

Secure integration of IoT and Cloud Computing

Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the int...

متن کامل

Enforcing Role-Based Access Control for Secure Data Storage in Cloud Using Authentication and Encryption Techniques

With the fast advancement taking place in cloud computing and services, the culture to use the cloud for largescale data storage is being adopted. This growth in cloud computing has elevated the key security issue of how to control and avert illegitimate access to data stored in the cloud. Now a days most of the work concentrates on privacy of data contents and access control, whereas the atten...

متن کامل

A Policy Based Access Control and Assured File Deletion for Secure Cloud Storage

Security guarantees are essential for the outsourced data, wh ich is maintained by third party cloud storage. To achieve s ecurity gu arantees f or t he out sourced data ba ckups, we design and implement a secure overlay cloud storage system called FADE. FADE achieves fine-grained, policy-based access control and file assured deletion. I t associates outsourced files with file access policies, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Engineering Research and Science

سال: 2017

ISSN: 2349-6495,2456-1908

DOI: 10.22161/ijaers.4.8.6