Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








11,659 Hits in 6.0 sec

A Lightweight Trust-based Access Control Model in Cloud-Assisted Wireless Body Area Networks

Xu Wu
2014 International Journal of Security and Its Applications  
In order to address these issues, we propose a lightweight trust-based access control model, where the users can acquire their access control privileges for the electronic healthcare data according to  ...  However, some new issues on data access control are associated with the integration of WBANs and cloud computing.  ...  Acknowledgements The work in this paper has been supported by Scientific Research Program  ... 
doi:10.14257/ijsia.2014.8.5.13 fatcat:2xy524je4zdcjmedfoorg5xvna

A Survey on Efficacious Data Transit System for Mobile Cloud Computing

Mr. V. Balamurugan
2019 International Journal for Research in Applied Science and Engineering Technology  
And also the pseudo random permutation based system is also being used to give the security to the data which is being stored in the cloud.  ...  In mobile cloud computing the data to be shared from the mobile devices to the cloud contains only the data confidentiality, authentication has been provided to the data which is being shared from the  ...  The Lightweight Cipher text access control mechanism is used to overcome the required security. The above mechanism is based on Authorization Certificates and Secret sharing scheme.  ... 
doi:10.22214/ijraset.2019.3091 fatcat:lsgfjqxg3ncovpkp7fohlaahqi

Authentication Techniques in Cloud Computing: A Review

Seyed Milad Dejamfar, Sara Najafzadeh
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Authentication is an important topic in cloud computing security. That is why various authentication techniques in cloud environment are presented in this paper.  ...  Each of these technologies (username and password, multi-factor authentication, mobile trusted module, public key infrastructure, single sign-on, and biometric authentication) is at first described in  ...  . 24 Data encryption and Diffie-Hellman key exchange mechanism and ECC [24] Secure connection Time delay due to complexity 25 Access control system along with auditing [25] A model to achieve fine-grained  ... 
doi:10.23956/ijarcsse/v7i1/01105 fatcat:mihknnax5zhszenuo5qa6wjifu

Impact of Data Privacy on Storage in Cloud Computing Ecosystem: A Brief Survey

Megha Singh
2020 International Journal for Research in Applied Science and Engineering Technology  
It provides a large storage and processing capabilities to consumers through cloud software and services. However, integrity is the serious concern in the loosely interfaced cloud environment.  ...  This paper attempts to investigate the impact of privacy factor on users' trust and also attempts to investigate loopholes in existing solution.  ...  Other attacks are not considered with solution and improved it to achieve complex security with achieving lightweight.  ... 
doi:10.22214/ijraset.2020.31181 fatcat:plbj6a7kh5e23og3nlikf3iuqm

Fine Grained Access Control Based on Smart Contract for Edge Computing

Yong Zhu, Xiao Wu, Zhihui Hu
2022 Electronics  
decentralized scalability, and lightweight deployment can be obtained by instance running in this study.  ...  Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack.  ...  Acknowledgments: The authors acknowledge the fund of State Key Laboratory of Computer Architecture (ICT, CAS) (grant no.  ... 
doi:10.3390/electronics11010167 fatcat:bx4cvnqr4zgbjj7hnttkvmsgha

HealthyBroker: A Trustworthy Blockchain-Based Multi-Cloud Broker for Patient-Centered eHealth Services

Heba Kurdi, Shada Alsalamah, Asma Alatawi, Sara Alfaraj, Lina Altoaimy, Syed Hassan Ahmed
2019 Electronics  
HealthyBroker was tested in a simulated eHealth multi-cloud environment.  ...  It enables care-team members to complete eHealth transactions securely and access relevant patient data on a "need-to-know" basis in compliance with data-protection laws.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics8060602 fatcat:5aghmc6bvbg7vplj2gkwrm2tbu

A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards

Nitin Naik, Paul Jenkins
2016 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)  
Managing digital identities and access control for cloud users and applications remains one of the greatest challenges facing cloud computing today.  ...  Many IAM standards have been proposed in the last two decades: Lightweight Directory Access Protocol (LDAP), Central Authentication Service (CAS), OZ Protocol, Security Assertion Markup Language (SAML)  ...  Extensive Authentication and Authorization Support In MCC, user identity and access control has to be managed across all the types of cloud delivery models (public, private and hybrid) and service models  ... 
doi:10.1109/mobilecloud.2016.22 dblp:conf/mobilecloud/NaikJ16 fatcat:yuwn2k4rvnhsxicg6r7kdg4z2u

Taxonomy towards Security using Encryption Algorithms in IOT-Based Healthcare System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The author focuses on detail analysis of various algorithms, encryption techniques used for preventing and avoiding security threats in IOT-based healthcare systems.  ...  It also raises some important questions and challenges for the security of systems, devices and networks.  ...  The main aim of this study is to achieve privacy and access control for secure transfer and storage of PPPs data.  ... 
doi:10.35940/ijitee.b7578.129219 fatcat:ikhizk4dffeldm4u6sqtzky5b4

Secured Access Control Using Secret key and OTP for Cloud Computing Services

Miss. Harnoor Sodhi
2018 International Journal for Research in Applied Science and Engineering Technology  
We consider another Secured access Control Using secret key and OTP for cloud computing services to achieve security in distributed cloud storage.  ...  In particular, in our proposed access control framework, a property based access control system is executed with the need of both a client secret key and a lightweight security device.  ...  We present another Secured Access Control Using Secret Key and OTP Cloud Computing Services to achieving security in distributed cloud storage.  ... 
doi:10.22214/ijraset.2018.3689 fatcat:fxs7j425ujaw5ksxvfsx74qf2y

Blockchain-Based Secured Access Control in an IoT System

Sultan Algarni, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, Mohammad Yamin
2021 Applied Sciences  
Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain.  ...  Moreover, the solution also enables secure communication between IoT devices, fog nodes and cloud computing.  ...  We proposed a multi-agent system to provide lightweight, decentralized IoT access control security mechanisms.  ... 
doi:10.3390/app11041772 fatcat:banim6a4djbwbedfvr7cbskrpq

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT

Kuo-Hui Yeh, Weizhi Meng, Sk Hafizul Islam, Kuan Zhang, Ennan Zhai
2020 IEEE Access  
In the article ''Efficient attribute-based access control with authorized search in cloud storage,'' by Hao et al., the authors propose an efficient attribute-based access control with authorized search  ...  In the article ''A novel attribute-based access control scheme using blockchain for IoT,'' by Ding et al., the authors propose a novel attribute-based access control scheme for data security in IoT systems  ... 
doi:10.1109/access.2020.3040469 fatcat:ixv7f7mk65bqrbepyd7v5vcxle

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective [article]

Behrouz Zolfaghari
2022 arXiv   pre-print
In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based Cloud  ...  We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT.  ...  Indeed, secure and parallel expressive Search over encrypted data with access control in multi-Cloud IoT has been implemented to improve availability, integrity, and privacy.  ... 
arXiv:2207.01590v2 fatcat:2kznp4sj7resznpiylio3wfrsa

Toward Fine-grained Data-level Access Control Model for Multi-tenant Applications

Kun Ma, Weijuan Zhang, Zijie Tang
2014 International Journal of Grid and Distributed Computing  
Cloud computing presents new security and privacy challenges to control access to multitenant applications in the cloud.  ...  However, this solution has more challenges once the number of access control list (ACL) increases in the cloud, such as efficiency of policy resolution, multi-tenancy and data isolation.  ...  supported by the Doctoral Fund of University of Jinan (XBS1237), the Teaching Research Project of University of Jinan (J1344), the Technology development Program of Shandong Province (2011GGX10116), and  ... 
doi:10.14257/ijgdc.2014.7.2.08 fatcat:mmzjjgkiijbxjeyk4zlhsjgwwq

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In this paper, we systematically review and analyze relevant research achievements.  ...  In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  TRADITION ACCESS CONTROL Privacy and security are the core of cloud, how to achieve secure and efficient access control of data resources has become a key issue in cloud computing [4] .  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
In this paper, authors proposed [14] a secure and verifiable access control scheme based on the NTRU cryptosystem for big data storage in clouds.  ...  Access control is the better one security mechanism in cloud computing.  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve
« Previous Showing results 1 — 15 out of 11,659 results