Towards Secure Risk-Adaptable Access Control in Cloud Computing
نویسندگان
چکیده
منابع مشابه
Secure Hierarchical Temporal Access Control in Cloud Computing
Cloud computing is a heavy appropriated registering standard. In spite of the fact that, distributed computing is a persuasive standard, access control is one of the principle security issues in distributed computing. Various methodologies for secure access control of outsourced information in distributed computing oblige figure content arrangement trait based encryption (CP-ABE), key-approach ...
متن کاملTrust-Based Access Control for Secure Cloud Computing
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...
متن کاملTowards Secure Cloud Database with Fine-Grained Access Control
Outsourcing data to cloud environments can offer ease of access, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides conf...
متن کاملTowards secure mobile cloud computing: A survey
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobile cloud computing, the growth of mobile cloud computing subscribers is still below expectat...
متن کاملA Secure Access Control system in Cloud
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2018
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2018.091247