2013
DOI: 10.11591/closer.v2i2.1665
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Gerges et al [10] proposed a scalable multi-tenant authorization system. This system replaces the role-to-object (RTO) mapping with role-to-role (RTR) mapping using the SplitMap role-mapping algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Gerges et al [10] proposed a scalable multi-tenant authorization system. This system replaces the role-to-object (RTO) mapping with role-to-role (RTR) mapping using the SplitMap role-mapping algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…To solve this problem, the idea of role-mapping (i.e., role-to-role mapping) technique came out. It maps user roles in each organization to the roles in the host organization, which owns the shared resource [10].…”
Section: Role-to-role (Rtr) Mapping Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach lacks scalability and flexibility in terms of user set and domain levels; as the numeral of legal users becomes large, the solution will not be efficient and performance degrades. The data owners are required to be online all the time so as to encrypt or re-encrypt data and distribute Keys to authorize users [8]. In this paper we had Extended HASBE ("Hierarchical Attribute Set-Based Encryption") by proposing secure key distribution with improved domain hierarchy of user roles to access the files stored on cloud [9].…”
Section: Cipher Text Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…Because cloud computing providers cannot distribute servers to all enterprises, providers virtualize server clusters to distribute and rent computing resources to companies. This is named multi-tenancy technology [7,8,9,10]. The major obstacle to this technology is how to protect consumer privacy while they access data.…”
Section: Ming-huang Guo (Corresponding Author) Department Of Informatmentioning
confidence: 99%