2023
DOI: 10.37256/cm.5120243721
|View full text |Cite
|
Sign up to set email alerts
|

Identity and Access Control Techniques for Enhanced Data Communication in Cloud

Rashmi Dixit,
K. Ravindranath

Abstract: The preservation of sensitive data and prevention of unauthorized access are critical objectives in cloud computing environments, necessitating the implementation of robust security measures. The present study delves into the amalgamation of the Hierarchical Role Based Access Control Model (HR-ACM), Composikey, a composite key encryption algorithm, and Interactive Tree Based zero knowledge protocol (ITZKP) to construct a robust security framework for cloud security. This study presents an investigation into th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 24 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?