2012 International Conference on Radar, Communication and Computing (ICRCC) 2012
DOI: 10.1109/icrcc.2012.6450570
|View full text |Cite
|
Sign up to set email alerts
|

A semantic-based access control for ensuring data security in cloud computing

Abstract: 1 Ensuring data security in cloud is an important research issue.Dataaccess Control isan efficient way for guaranteeing the data security. Data access cannot be controlled safely and efficiently, unless access decision takes semantic relationship among different entities in the access control domain. Accessdecisions made with considering entities in isolation,rather than taking their interrelationships into account may result in security violations. Traditional access control models like MAC, DAC, RBAC fails t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The decisions in MAC are not made by an owner but a central system [11,12]. In this way, more powerful processes are performed in security models [57,64,65]. The wholeness and privacy of the system are the most important features after security.…”
Section: Mandatory Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…The decisions in MAC are not made by an owner but a central system [11,12]. In this way, more powerful processes are performed in security models [57,64,65]. The wholeness and privacy of the system are the most important features after security.…”
Section: Mandatory Access Controlmentioning
confidence: 99%
“…The owner gives the necessary authorization to individuals in the system, introduces limitations, and limits their access to the system according to his own will [12,51]. Although the most important feature of this system is the fact that it has a high level of security, it cannot distinguish between the subjects and object domains and has security leaks [57][58][59][60]. This access control is based on the user or group control.…”
Section: Discretionary Access Controlmentioning
confidence: 99%
“…Semantic -based access control to guarantee data security in cloud computing [2] The proposed method decreases access control complexity.…”
Section: Biometric Authenticationmentioning
confidence: 99%