2023
DOI: 10.32604/csse.2023.023378
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy User Access Trust Model for Cloud Access Control

Abstract: Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hij… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…The cloud model is a distributed computing and storage model built on a cloud computing platform [7][8]. It utilizes cloud computing technology to centrally manage and schedule resources such as computing, storage, and services, providing a flexible, scalable, and cost-effective computing environment.…”
Section: Cloud Modelmentioning
confidence: 99%
“…The cloud model is a distributed computing and storage model built on a cloud computing platform [7][8]. It utilizes cloud computing technology to centrally manage and schedule resources such as computing, storage, and services, providing a flexible, scalable, and cost-effective computing environment.…”
Section: Cloud Modelmentioning
confidence: 99%