Data Access Controls in Cloud: A Survey
|
|
Author:
|
YOGESH M.GAJMAL, R.UDAYAKUMAR
|
Abstract:
|
Cloud computing be present for distribution of as per requirement of assets. All as of requests toward information centres above the net taking place a pay-as-use base. Cloud computing is the usage of different facilities, such as software growth platforms, servers, storing and software. Cloud computing allows enterprises to put away a compute source, such as a simulated device, storing or an application, as a service somewhat than taking to construct and maintain computing structures in company. Cloud computing is an in effect explanation for the at ease and fastest storing and recovery of information. The key problem in cloud computing is safety. Information right to use mechanism offers the safety of information inside the cloud. Right to use Mechanism provides an active technique to make certain that approved customers can access the information and the method. In this paper we studied diverse data access controls similar to Role based model, Attribute centered Encryption, key- strategy attribute centered encryption, Identity centered encryption for cloud.
|
Keyword:
|
Access Control, Cloud Computing, Encryption.
|
EOI:
|
-
|
DOI:
|
https://doi.org/10.31838/ijpr/2020.12.04.280
|
Download:
|
Request For Article
|
|
|