Adaptive Secure Document Access Mechanism in Cloud
نویسندگان
چکیده
منابع مشابه
Secure Access Mechanism for Cloud Storage
Emerging storage cloud systems provide continuously available and highly scalable storage services to millions of geographically distributed clients. A secure access control mechanism is a crucial prerequisite for allowing clients to entrust their data to such cloud services. The seamlessly unlimited scale of the cloud and the new usage scenarios that accompany it pose new challenges in the des...
متن کاملSecure Document Service for Cloud Computing
The development of cloud computing is still in its initial stage, and the biggest obstacle is data security. How to guarantee the privacy of user data is a worthwhile study. This paper has proposed a secure document service mechanism based on cloud computing. Out of consideration of security, in this mechanism, the content and the format of documents were separated prior to handling and storing...
متن کاملA Secure Access Control system in Cloud
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...
متن کاملSecure Relational Data Access in The Cloud
With the success of the cloud computing paradigm, data security in the cloud remains a big concern and even an obstacle that prohibits the adoption of enterprise usage of the cloud. Although encryption can provide confidentiality for enterprise data, most current data access methods on encrypted data either sacrifice query efficiency for data confidentiality, or trade off partial confidentialit...
متن کاملComputation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud
An efficient fine-grained encryption-based access control scheme for documents stored in the public cloud network proposed by Mohamed et al utilizes more computational and storage complexities. Although, Mohamed et al.'s broadcast key management scheme communicates group key securely, it consumes massive computational and storage resources for frequently changing the group key. In order to avoi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.63103