A Survey on Data control from sender using cloud computing |
| ( Vol-4,Issue-2,February 2017 ) OPEN ACCESS |
| Author(s): |
I.Subhashree, S.Swetha, S.Vanmathi, Muthukumarasamy.S |
| Keywords: |
|
authorization, cloud computing, data centric access control, role based access control systems. |
| Abstract: |
|
To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organization’s structure bounds. This results in loss of data and information which leads to low cost security issues that, reduces adoption of Cloud computing techniques. This paper surveys mainly on data-centric access control with enriched role-based quality focusing security as a target, protecting user information despite the Cloud service provider that holds it. It also deals with identity based encryption and proxy re-encryption techniques to protect the authorization model. |
|
|
| Paper Statistics: |
|
| Cite this Article: |
| Click here to get all Styles of Citation using DOI of the article. |



Advanced Engineering Research and Science