2017
DOI: 10.1109/access.2017.2665586
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Flexible and Self-Contained Data Protection in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…This solution utilized the logical formalism provided to implement advanced rule management, such as semantic conflict detection. According to combination RBAC with ciphertext policy attributes, [171] proposed a RBAC-CP-ABE scheme of data protection mechanism. Security analysis showed that this scheme maintained the security and efficiency characteristics of the CP-ABE scheme, but greatly improved the access control capability.…”
Section: Extension Access Control Of Privacy Protectionmentioning
confidence: 99%
“…This solution utilized the logical formalism provided to implement advanced rule management, such as semantic conflict detection. According to combination RBAC with ciphertext policy attributes, [171] proposed a RBAC-CP-ABE scheme of data protection mechanism. Security analysis showed that this scheme maintained the security and efficiency characteristics of the CP-ABE scheme, but greatly improved the access control capability.…”
Section: Extension Access Control Of Privacy Protectionmentioning
confidence: 99%
“…The proposed algorithm for long task starvation can be extended with other scheduling algorithms to increase performance of Resource Management [29]. Addressed the data protection problem in cloud computing [31].…”
Section: Sukhpal Et Al[28] 2017mentioning
confidence: 99%
“…Proposed method [31] does not add any security risk or computational overhead and improves the access control capabilities in a cloud environment.…”
Section: Sukhpal Et Al[28] 2017mentioning
confidence: 99%
“…A key characteristic of RBAC is that it allows the specification and enforcement of various constraint policies [21][22][23], such as cardinality constraints and separation-of-duty constraints (also called separation-of-duty policies), which can reflect security policies of different enterprises and organizations and ensure system security. The cardinality constraint limits the maximum number of roles related to users or to permissions, the maximum number of permissions a role can have, or the maximum number of users to which a role can be assigned [14].…”
Section: Introductionmentioning
confidence: 99%