A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Lightweight Trust-based Access Control Model in Cloud-Assisted Wireless Body Area Networks
2014
International Journal of Security and Its Applications
In order to address these issues, we propose a lightweight trust-based access control model, where the users can acquire their access control privileges for the electronic healthcare data according to ...
However, some new issues on data access control are associated with the integration of WBANs and cloud computing. ...
Acknowledgements The work in this paper has been supported by Scientific Research Program ...
doi:10.14257/ijsia.2014.8.5.13
fatcat:2xy524je4zdcjmedfoorg5xvna
A Survey on Efficacious Data Transit System for Mobile Cloud Computing
2019
International Journal for Research in Applied Science and Engineering Technology
And also the pseudo random permutation based system is also being used to give the security to the data which is being stored in the cloud. ...
In mobile cloud computing the data to be shared from the mobile devices to the cloud contains only the data confidentiality, authentication has been provided to the data which is being shared from the ...
The Lightweight Cipher text access control mechanism is used to overcome the required security. The above mechanism is based on Authorization Certificates and Secret sharing scheme. ...
doi:10.22214/ijraset.2019.3091
fatcat:lsgfjqxg3ncovpkp7fohlaahqi
Authentication Techniques in Cloud Computing: A Review
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Authentication is an important topic in cloud computing security. That is why various authentication techniques in cloud environment are presented in this paper. ...
Each of these technologies (username and password, multi-factor authentication, mobile trusted module, public key infrastructure, single sign-on, and biometric authentication) is at first described in ...
.
24 Data encryption and Diffie-Hellman key exchange mechanism and ECC [24] Secure connection Time delay due to complexity 25 Access control system along with auditing [25] A model to achieve fine-grained ...
doi:10.23956/ijarcsse/v7i1/01105
fatcat:mihknnax5zhszenuo5qa6wjifu
Impact of Data Privacy on Storage in Cloud Computing Ecosystem: A Brief Survey
2020
International Journal for Research in Applied Science and Engineering Technology
It provides a large storage and processing capabilities to consumers through cloud software and services. However, integrity is the serious concern in the loosely interfaced cloud environment. ...
This paper attempts to investigate the impact of privacy factor on users' trust and also attempts to investigate loopholes in existing solution. ...
Other attacks are not considered with solution and improved it to achieve complex security with achieving lightweight. ...
doi:10.22214/ijraset.2020.31181
fatcat:plbj6a7kh5e23og3nlikf3iuqm
Fine Grained Access Control Based on Smart Contract for Edge Computing
2022
Electronics
decentralized scalability, and lightweight deployment can be obtained by instance running in this study. ...
Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack. ...
Acknowledgments: The authors acknowledge the fund of State Key Laboratory of Computer Architecture (ICT, CAS) (grant no. ...
doi:10.3390/electronics11010167
fatcat:bx4cvnqr4zgbjj7hnttkvmsgha
HealthyBroker: A Trustworthy Blockchain-Based Multi-Cloud Broker for Patient-Centered eHealth Services
2019
Electronics
HealthyBroker was tested in a simulated eHealth multi-cloud environment. ...
It enables care-team members to complete eHealth transactions securely and access relevant patient data on a "need-to-know" basis in compliance with data-protection laws. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics8060602
fatcat:5aghmc6bvbg7vplj2gkwrm2tbu
A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards
2016
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
Managing digital identities and access control for cloud users and applications remains one of the greatest challenges facing cloud computing today. ...
Many IAM standards have been proposed in the last two decades: Lightweight Directory Access Protocol (LDAP), Central Authentication Service (CAS), OZ Protocol, Security Assertion Markup Language (SAML) ...
Extensive Authentication and Authorization Support In MCC, user identity and access control has to be managed across all the types of cloud delivery models (public, private and hybrid) and service models ...
doi:10.1109/mobilecloud.2016.22
dblp:conf/mobilecloud/NaikJ16
fatcat:yuwn2k4rvnhsxicg6r7kdg4z2u
Taxonomy towards Security using Encryption Algorithms in IOT-Based Healthcare System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The author focuses on detail analysis of various algorithms, encryption techniques used for preventing and avoiding security threats in IOT-based healthcare systems. ...
It also raises some important questions and challenges for the security of systems, devices and networks. ...
The main aim of this study is to achieve privacy and access control for secure transfer and storage of PPPs data. ...
doi:10.35940/ijitee.b7578.129219
fatcat:ikhizk4dffeldm4u6sqtzky5b4
Secured Access Control Using Secret key and OTP for Cloud Computing Services
2018
International Journal for Research in Applied Science and Engineering Technology
We consider another Secured access Control Using secret key and OTP for cloud computing services to achieve security in distributed cloud storage. ...
In particular, in our proposed access control framework, a property based access control system is executed with the need of both a client secret key and a lightweight security device. ...
We present another Secured Access Control Using Secret Key and OTP Cloud Computing Services to achieving security in distributed cloud storage. ...
doi:10.22214/ijraset.2018.3689
fatcat:fxs7j425ujaw5ksxvfsx74qf2y
Blockchain-Based Secured Access Control in an IoT System
2021
Applied Sciences
Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain. ...
Moreover, the solution also enables secure communication between IoT devices, fog nodes and cloud computing. ...
We proposed a multi-agent system to provide lightweight, decentralized IoT access control security mechanisms. ...
doi:10.3390/app11041772
fatcat:banim6a4djbwbedfvr7cbskrpq
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT
2020
IEEE Access
In the article ''Efficient attribute-based access control with authorized search in cloud storage,'' by Hao et al., the authors propose an efficient attribute-based access control with authorized search ...
In the article ''A novel attribute-based access control scheme using blockchain for IoT,'' by Ding et al., the authors propose a novel attribute-based access control scheme for data security in IoT systems ...
doi:10.1109/access.2020.3040469
fatcat:ixv7f7mk65bqrbepyd7v5vcxle
The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective
[article]
2022
arXiv
pre-print
In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based Cloud ...
We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT. ...
Indeed, secure and parallel expressive Search over encrypted data with access control in multi-Cloud IoT has been implemented to improve availability, integrity, and privacy. ...
arXiv:2207.01590v2
fatcat:2kznp4sj7resznpiylio3wfrsa
Toward Fine-grained Data-level Access Control Model for Multi-tenant Applications
2014
International Journal of Grid and Distributed Computing
Cloud computing presents new security and privacy challenges to control access to multitenant applications in the cloud. ...
However, this solution has more challenges once the number of access control list (ACL) increases in the cloud, such as efficiency of policy resolution, multi-tenancy and data isolation. ...
supported by the Doctoral Fund of University of Jinan (XBS1237), the Teaching Research Project of University of Jinan (J1344), the Technology development Program of Shandong Province (2011GGX10116), and ...
doi:10.14257/ijgdc.2014.7.2.08
fatcat:mmzjjgkiijbxjeyk4zlhsjgwwq
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions
2019
IEEE Access
In this paper, we systematically review and analyze relevant research achievements. ...
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified ...
TRADITION ACCESS CONTROL Privacy and security are the core of cloud, how to achieve secure and efficient access control of data resources has become a key issue in cloud computing [4] . ...
doi:10.1109/access.2019.2946185
fatcat:tbg5a25f5rd3je4mogemegrvje
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
In this paper, authors proposed [14] a secure and verifiable access control scheme based on the NTRU cryptosystem for big data storage in clouds. ...
Access control is the better one security mechanism in cloud computing. ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
« Previous
Showing results 1 — 15 out of 11,659 results