[PDF][PDF] Improved hierarchical role based access control model for cloud

N Thilakarathne, D Wickramaaarachchi - Int. J. Computer Sci. Netw, 2019 - academia.edu
Cloud computing is considered as the one of the most dominant paradigm in the field of
information technology which offers on demand cost effective services such as Software as a …

Analysis of access control methods in cloud computing

M Mulimani, R Rachh - 2016 - preprints.org
Cloud Computing is a promising and emerging technology that is rapidly being adopted by
many IT companies due to a number of benefits that it provides, such as large storage …

Privacy aware access control for data sharing in cloud computing environments

H Takabi - Proceedings of the 2nd international workshop on …, 2014 - dl.acm.org
In cloud computing environments, data protection is usually limited to access control policies
that are enforced by cloud service providers (CSPs). However, there are many cases where …

Survey of access control models for cloud based real-time applications

B Balamurugan, NG Shivitha… - International …, 2015 - ieeexplore.ieee.org
Cloud computing is one of the prominent technologies in this century. Due to its various
features and capabilities, it attracted a large population towards it. Cloud is a huge pool of …

[PDF][PDF] An efficient scheme for cloud services based on access policies

V Suma, KV Kuma - International Journal of Engineering Research & …, 2012 - academia.edu
Recent years have witnessed the trend of leveraging cloud based services for large scale
content storage, processing, and distribution. Cloud computing, as an emerging computing …

[PDF][PDF] HASBE: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption/decryption in cloud computing

S Gokuldev, S Leelavathi - International Journal of Engineering …, 2013 - researchgate.net
Cloud computing has emerged as one of the most important paradigms in the IT industry for
last few years. In general data owners and service providers are not in the same trusted …

[PDF][PDF] DACD: Delegated Access Control of Data in Cloud computing environment

P Liyaz, NP Kumar, B Mahesh - academia.edu
Cloud computing provides a service based on internet for several shared resources and
system software across various environment. For secure cloud storage the process of …

[PDF][PDF] A Survey on Delegated Access Control in Public Cloud

V Karthik, KS Arvind - International Journal of Innovative Research in …, 2014 - Citeseer
Cloud computing, as an emerging computing standard. Cloud computing enables users to
remotely store their data in a cloud and also benefit from services on-demand. With rapid …

Efficient and Secure Data Access Control in the Cloud Environment

A Chunduru, G Mamidisetti - Impact of Digital Transformation on …, 2020 - igi-global.com
Cloud computing is a highly demanding zone in the present IT enterprise. The key
characteristics are adaptability, productivity, pay-per-utilize, and cost viability. Access control …

An identity preserving access control scheme with flexible system privilege revocation in cloud computing

R Ahuja, SK Mohanty, K Sakurai - 2016 11th Asia Joint …, 2016 - ieeexplore.ieee.org
The advent of cloud computing motivates business organizations to migrate their complex
data management systems from local servers to cloud servers for scalable and durable …