2016
DOI: 10.1515/cait-2016-0002
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 47 publications
0
25
0
Order By: Relevance
“…These applications and services employ huge data centres, owned by Cloud Service Providers (CSPs) around the world. They include high-grade servers connected to create what is known as a "cloud" by hosting web servers and web applications (S h y n u and S i n g h [50]). Cloud has several features that provide it with the ability to serve its customers efficiently such as scalability, flexibility, ondemand and elasticity (W a n g et al [59]).…”
Section: Cloud Computing Securitymentioning
confidence: 99%
“…These applications and services employ huge data centres, owned by Cloud Service Providers (CSPs) around the world. They include high-grade servers connected to create what is known as a "cloud" by hosting web servers and web applications (S h y n u and S i n g h [50]). Cloud has several features that provide it with the ability to serve its customers efficiently such as scalability, flexibility, ondemand and elasticity (W a n g et al [59]).…”
Section: Cloud Computing Securitymentioning
confidence: 99%
“…B.Harikrishna, Dr.S.Kiran, R.Pradeep kumar Reddy [3] gave a survey about the available cryptography schemes for sensitive data on cloud. As we know that in today"s era cloud is highly demanded technology because it is like an outsourcing of IT services and communications.…”
Section: Literature Surveymentioning
confidence: 99%
“…This algorithm is used for cryptography that uses one secret key which is known by both sender and receiver. [3] It converts the plain text to cipher text and decrypts the cipher text to plain text using that key. The key is maintaining the privacy between both parties.…”
Section: Symmetric Key Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…RBAC provides flexibility for a subject to have multiple roles or membership in multiple groups [11]. It has an integrated support for principle of least-privilege, separation of duties and central administration of role memberships and access controls [7].…”
Section: Role-based Access Control (Rbac)mentioning
confidence: 99%