2018
DOI: 10.11648/j.ajsea.20180701.11
|View full text |Cite
|
Sign up to set email alerts
|

Research on Access Control in Cloud Storage System: From Single to Multi-Clouds

Abstract: Implementation of access control in cloud storage system is the essential method to protect users' data from revealing sensitive information. The paper mainly investigates key technologies of access control in cloud storage system, including intra cloud and among multi-clouds. Firstly, we discuss about the focuses in recent researches and challenges of access control in cloud storage system. The access control researches here refer to cipher-text and cross-domain access control in cloud storage system. The key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…The access control requirements or issues may vary from one application domain to other. In cloud computing, protecting user's data from unauthorised access, developing data owner's trust in cloud service providers (CSP), hiding the identity of the data owner (data anonymity), and exchanging data among multiple clouds securely are some of the main concerns (Purushothama and Amberker, 2017;Mishra et al, 2020;Priya et al, 2017;Almutairi et al, 2021;Fan et al, 2018). Maintaining the privacy of patient's data, limiting unnecessary access, deciding the boundary of access to patient's information are some of the basic requirements in healthcare applications (Karim et al, 2017;de Carvalho and Bandiera-Paiva, 2018;Chenthara et al, 2019;Al-Issa et al, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…The access control requirements or issues may vary from one application domain to other. In cloud computing, protecting user's data from unauthorised access, developing data owner's trust in cloud service providers (CSP), hiding the identity of the data owner (data anonymity), and exchanging data among multiple clouds securely are some of the main concerns (Purushothama and Amberker, 2017;Mishra et al, 2020;Priya et al, 2017;Almutairi et al, 2021;Fan et al, 2018). Maintaining the privacy of patient's data, limiting unnecessary access, deciding the boundary of access to patient's information are some of the basic requirements in healthcare applications (Karim et al, 2017;de Carvalho and Bandiera-Paiva, 2018;Chenthara et al, 2019;Al-Issa et al, 2019).…”
Section: Introductionmentioning
confidence: 99%