An Approach for Cloud Security Using TPA-and Role-Based Hybrid Concept

P Singh, MK Mukhija, SK Alaria - Proceedings of Third International …, 2022 - Springer
In the cloud environment, enormous amount of the data is shared on the server for the
availability of access to the employees or customers related to the organization. Two main …

A Security Approach to Manage a Smart City's Image Data on Cloud

MK Mukhija, SK Alaria, P Singh - AI-Centric Smart City …, 2022 - api.taylorfrancis.com
In the cloud environment, an enormous amount of the data is shared on the server for
available access to the employees or customers related to the organization. Two main …

Literature Survey of Role Policy Access Using Cloud

SK Naidu, KA Ayub, S Revathy - 2018 2nd International …, 2018 - ieeexplore.ieee.org
Cloud Computing is a technology that consists of an internal server and a common server
which is used to store data in it in such a way that it can be accessed universally. Big data is …

A security architecture research based on roles

L Tao, J Shen, B Liu, Z Zhou - MATEC web of conferences, 2017 - matec-conferences.org
Security has always been the top issue against the cloud computing, scientific security
architecture is the foundation of other security technologies. Comparing existed cloud …

A authentication and access authorization mechanism on the PaaS platform

S Xu, Y Xin, H Zhu, S Luo… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Security of Platform as a Service for multi-tenant becomes a key factor for the sustainable
development of the system. This paper analyzes the limitations and shortcomings of …

[PDF][PDF] Comparison of data security in grid and cloud computing

H Kaur - International Journal of Research in Engineering and …, 2013 - Citeseer
In the current era, Grid computing and cloud computing are the main fields in the research
work. This thesis define which are the main security issues to be considered in cloud …

Enhancement in Security for Intercloud Scenario with the Help of Role-Based Access Control Model

R Dixit, K Ravindranath - IOT with Smart Systems: Proceedings of ICTIS …, 2022 - Springer
Cloud according to the latest buzz is the third wave of digitization. Cloud brought all things
back at the center. Cloud redefines the way of computing—“where you computing is not …

[PDF][PDF] Advanced Security Framework Model for Cloud Computing Environment

HG Choi, SH Sim - Life Science Journal, 2014 - lifesciencesite.com
Cloud computing technology is a new trend of IT (Information Technology). In this
environment, all users can share their information and experience very easily. However it is …

An efficient approach for multiple user data security in cloud computing

B Mondol, MA Mahmood - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Cloud computing can be a growing paradigm that includes growing to be today's best study
location because of the power to slow up the charges connected with calculating. In today's …

A newer user authentication, file encryption and distributed server based cloud computing security architecture

KW Nafi, TS Kar, SA Hoque, MMA Hashem - arXiv preprint arXiv …, 2013 - arxiv.org
The cloud computing platform gives people the opportunity for sharing resources, services
and information among the people of the whole world. In private cloud system, information is …