2015
DOI: 10.1016/j.procs.2015.02.133
|View full text |Cite
|
Sign up to set email alerts
|

Fine Grained Access Control and Revocation for Secure Cloud Environment – A Polynomial Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…It ensured the secure sharing of resources, providing diverse access control to the same cloud user, and gave user the capability to utilize various services securely. Te researchers suggested diferent types of access control models for the cloud computing environments [34]. To address the vulnerability in data privacy of cloud users in cloud computing environment, a fne-grained access control mechanism using cryptography was proposed.…”
Section: Access Control In Cloudmentioning
confidence: 99%
“…It ensured the secure sharing of resources, providing diverse access control to the same cloud user, and gave user the capability to utilize various services securely. Te researchers suggested diferent types of access control models for the cloud computing environments [34]. To address the vulnerability in data privacy of cloud users in cloud computing environment, a fne-grained access control mechanism using cryptography was proposed.…”
Section: Access Control In Cloudmentioning
confidence: 99%
“…It uses Vickrey-Clark-Groves (VCG)-based adaptive reputation mechanism and the distributed multi-level security scheme and hierarchy key management scheme for fine-grained access control. Mohan and Sudheep Elayidom (2015) proposed an access control scheme in cloud environment based on polynomial-based approach. The data owner in this scheme uses symmetric encryption technique and performs an access control based on polynomial-based secret sharing approach and user revocation done is based on Lagrange interpolation scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed method ABE in [5], [7], [13,14], RBAC in [4,5], [10] and ABAC [6], [8] are some of the techniques which are utilized for outsourced data in cloud. ABE stands for Attribute Based Encryption was discovered by sahai and waters [2] to use in implement access control techniques taking into account different properties.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the fact that, these model shows change as far as execution proficiency and adaptability, the techniques neglected to give broad answer for versatility issue. Notwithstanding this, the RBAC display still endure by part blast issue [10] which is confronted by a few substantial scale venture that requires fine grain access control than what the current RBAC underpins.…”
Section: Introductionmentioning
confidence: 99%