A Survey on Data control from sender using cloud computing
Journal: International Journal of Advanced Engineering Research and Science (Vol.4, No. 2)Publication Date: 2017-02-07
Authors : I.Subhashree; S.Swetha; S.Vanmathi; Muthukumarasamy.S;
Page : 27-30
Keywords : authorization; cloud computing; data centric access control; role based access control systems..;
Abstract
To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organizationâ?™s structure bounds. This results in loss of data and information which leads to low cost security issues that, reduces adoption of Cloud computing techniques. This paper surveys mainly on data-centric access control with enriched role-based quality focusing security as a target, protecting user information despite the Cloud service provider that holds it. It also deals with identity based encryption and proxy re-encryption techniques to protect the authorization model.
Other Latest Articles
- Dynamic Value Stream Mapping in the Realm of Green Manufacturing
- THE FORMATION OF NEW PUBLIC FINANCE MANAGEMENT SYSTEM WITHIN THE FRAMEWORK OF MODERN THEORY OF PUBLIC FINANCE
- Труд страхового агента
- Inflation of Competence-Based Approach in the Russian Pedagogical Science and Practical Teaching
- CAUSES, CONSEQUENCES AND WAYS OF MINIMIZE THE UNEMPLOYMENT
Last modified: 2017-02-14 16:00:26