Statistics

    Map

Twitter


A Survey on Data control from sender using cloud computing

( Vol-4,Issue-2,February 2017 ) OPEN ACCESS
Author(s):

I.Subhashree, S.Swetha, S.Vanmathi, Muthukumarasamy.S

Keywords:

authorization, cloud computing, data centric access control, role based access control systems.

Abstract:

To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organization’s structure bounds. This results in loss of data and information which leads to low cost security issues that, reduces adoption of Cloud computing techniques. This paper surveys mainly on data-centric access control with enriched role-based quality focusing security as a target, protecting user information despite the Cloud service provider that holds it. It also deals with identity based encryption and proxy re-encryption techniques to protect the authorization model.

ijaers doi crossref DOI:

10.22161/ijaers.4.2.5

Paper Statistics:
Cite this Article:
Click here to get all Styles of Citation using DOI of the article.