2017
DOI: 10.5815/ijeme.2017.03.02
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Access Control Methods in Cloud Computing

Abstract: Cloud Computing is a promising and emerging technology that is rapidly being adopted by many IT companies due to a number of benefits that it provides, such as large storage space, low investment cost, virtualization, resource sharing, etc. Users are able to store a vast amount of data and information in the cloud and access it from anywhere, anytime on a pay-per-use basis. Many users are able to share the data and the resources stored in the cloud. Hence, there arises a need to provide access to the data to o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…There are accessed by the security classification here it will discussed about two access classes there are of security level and set of categories, the security level will provide a hierarchical ordering which include the data should be on the top secret, confidential, and unclassified shown in fig.1. Thus the set of categories will includes the unordered subsets, which reflects on the elements such as functions and the competence areas (Army, Military, and Financial Administration) [17].…”
Section: Proposed Systemmentioning
confidence: 99%
“…There are accessed by the security classification here it will discussed about two access classes there are of security level and set of categories, the security level will provide a hierarchical ordering which include the data should be on the top secret, confidential, and unclassified shown in fig.1. Thus the set of categories will includes the unordered subsets, which reflects on the elements such as functions and the competence areas (Army, Military, and Financial Administration) [17].…”
Section: Proposed Systemmentioning
confidence: 99%
“…In the early stages of computing, security experts are eager in designing new security mechanism to handle massive changes in controlling access via cloud computing. Researches [6], [7] on the evolution of access control model such as Identification Based Access Control (IBAC) and Role Based Access Control (RBAC) showed the dependencies on predefined user identity and roles as it is working great in a non-distributed environment.…”
Section: Introductionmentioning
confidence: 99%