Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government 2021
DOI: 10.4018/978-1-7998-5351-0.ch022
|View full text |Cite
|
Sign up to set email alerts
|

Ensure Hierarchal Identity Based Data Security in Cloud Environment

Abstract: Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The goal of action recognition is to detect and recognize human actions automatically in video sequences. Due to the growing demand for automatic interpretation of human action, action recognition has caught the attention in both academia and industry [16]. Analyzing and understanding a person's action in a video is necessary for a wide range of applications, such as web video classification [17], assisting the visually impaired [8], surveillance and security.…”
Section: Action Recognitionmentioning
confidence: 99%
See 2 more Smart Citations
“…The goal of action recognition is to detect and recognize human actions automatically in video sequences. Due to the growing demand for automatic interpretation of human action, action recognition has caught the attention in both academia and industry [16]. Analyzing and understanding a person's action in a video is necessary for a wide range of applications, such as web video classification [17], assisting the visually impaired [8], surveillance and security.…”
Section: Action Recognitionmentioning
confidence: 99%
“…So far, the approaches used for action recognition include template matching methods, hidden Markov models (HMM) and machine learning methods [16]. Shechtman et al [18].…”
Section: Action Recognitionmentioning
confidence: 99%
See 1 more Smart Citation
“…A plenty of methods have been proposed to perform authentication [2,[6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Among them, the alphanumerical password authentication is the primary form, because this form is easy to implement.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the unbalanced cloud servers cause increased power consumption, poor resource utilization, increased response time, and decreased throughput [7]. So, an effective load balancing methodology is required for balancing the load of cloud servers, which improves the overall performance of the cloud servers [8]. In addition to this, the outsourced data are the crucial entities in the cloud computing environment that suffers from numerous attacks and threats by exploring the vulnerabilities available in the cloud modules [9,10].…”
Section: Introductionmentioning
confidence: 99%