SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control Management for Secure Cloud Storage

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

متن کامل

Secure Access Mechanism for Cloud Storage

Emerging storage cloud systems provide continuously available and highly scalable storage services to millions of geographically distributed clients. A secure access control mechanism is a crucial prerequisite for allowing clients to entrust their data to such cloud services. The seamlessly unlimited scale of the cloud and the new usage scenarios that accompany it pose new challenges in the des...

متن کامل

A Policy Based Access Control and Assured File Deletion for Secure Cloud Storage

Security guarantees are essential for the outsourced data, wh ich is maintained by third party cloud storage. To achieve s ecurity gu arantees f or t he out sourced data ba ckups, we design and implement a secure overlay cloud storage system called FADE. FADE achieves fine-grained, policy-based access control and file assured deletion. I t associates outsourced files with file access policies, ...

متن کامل

Enforcing Role-Based Access Control for Secure Data Storage in Cloud Using Authentication and Encryption Techniques

With the fast advancement taking place in cloud computing and services, the culture to use the cloud for largescale data storage is being adopted. This growth in cloud computing has elevated the key security issue of how to control and avert illegitimate access to data stored in the cloud. Now a days most of the work concentrates on privacy of data contents and access control, whereas the atten...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2020

ISSN: 2327-4662,2372-2541

DOI: 10.1109/jiot.2020.2963899