Emerging Access Control Techniques in Cloud Computing: A Survey

GV Mini, KSA Viji - … 2nd International Conference on Trends in …, 2018 - ieeexplore.ieee.org
Cloud computing is widely getting acceptance due to its low cost and shared computing
capabilities. However trust, security and privacy are the major concerns in cloud …

Privacy-Enhanced Access Control for Providing Efficient Security in Cloud Environment

BB Rishiroop, P Puneeth, T Bhanuteja, M Selvi… - Proceedings of Third …, 2022 - Springer
Cloud computing is the distributed collection of virtual computing devices which are used to
store, process and outsource the data for the different vendors in dynamic manner. Data …

CACS—Compliant Access Control Scheme for Populated Cloud User Services

M Pajany, G Zayaraz - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Cloud resources provide ubiquitous service access for the connected users and applications
through heterogeneous infrastructures. Being an open platform and permitting anywhere …

A survey on access control models in cloud computing

RK Aluvalu, L Muddana - Emerging ICT for Bridging the Future …, 2015 - Springer
Cloud computing, is an emerging computing paradigm, enabling users to remotely store
their data in a server and provide services on-demand. In cloud computing cloud users and …

[PDF][PDF] Privacy and security challenges towards cloud-based access control

ME Rana, M Kubbo, M Jayabalan - Asian. Journal of Information …, 2017 - researchgate.net
Over the years, data theft has been rampant in financial institutions, however at present
medical data is in the spotlight. Healthcare industry is considered as a potential target for …

A Comprehensive Review on Granularity Perspective of the Access Control Models in Cloud Computing

AK Routh, P Ranjan - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this review, we explore into the critical realm of access control in cloud computing, a
fundamental component ensuring data and resource confidentiality, integrity, and …

A multi-tenant access control method based on environmental attributes and security labels

Y Duan, X Deng, H Yang - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Secure access control is a key technology to protect cloud data from unauthorized access
and achieve safe sharing of user data. On the basis of introducing traditional access control …

A survey of cloud computing security challenges, issues and their countermeasures

LB Bhajantri, T Mujawar - … conference on I-SMAC (IoT in Social …, 2019 - ieeexplore.ieee.org
Cloud computing is an emerging paradigm that provides on demand access to various
resources such as servers, storage, applications, networking etc., over the internet. Cloud …

Enhancing Access Control Mechanisms for Data Stored in Cloud Computing

JB Madavarapu, RK Yalamanchili… - 2024 5th …, 2024 - ieeexplore.ieee.org
The security and access control of data kept in the cloud are becoming increasingly
important to the popularity of cloud computing services. In cloud computing, the access …

Access Control in Cloud Computing

Q Zhao, M Ma, Y Zhang, B He - Web-Based Services: Concepts …, 2016 - igi-global.com
Data sharing as one of the most popular service applications in cloud computing has
received wide attention, which makes the consumers achieve the shared contents whenever …