2019
DOI: 10.4018/ijapuc.2019070103
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing

Abstract: Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…It allows authorized personnel access to data and application resources within an allowable time while limiting access to illegitimate users (Cai et al, 2019; Mouratidis et al, 2019). Authentication and authorization are two components of access control to consider (Bhajantri & Mujawar, 2019; Xu & Hongliang, 2019). Authentication services check and authenticate user identification using a secret code, such as a password, as well as verifying whether the information provided by the user is accurate.…”
Section: Introductionmentioning
confidence: 99%
“…It allows authorized personnel access to data and application resources within an allowable time while limiting access to illegitimate users (Cai et al, 2019; Mouratidis et al, 2019). Authentication and authorization are two components of access control to consider (Bhajantri & Mujawar, 2019; Xu & Hongliang, 2019). Authentication services check and authenticate user identification using a secret code, such as a password, as well as verifying whether the information provided by the user is accurate.…”
Section: Introductionmentioning
confidence: 99%