Affiliation:
1. Rajiv Gandhi University of Knowledge Technologies, India
2. Presidency University, India
Abstract
Cloud computing is a highly demanding zone in the present IT enterprise. The key characteristics are adaptability, productivity, pay-per-utilize, and cost viability. Access control and information security are the significant issues in cloud computing. Various access control strategies are present. The major problems of storing data in expandable access control and access rights from users are not used in this scheme. This chapter presents a generic survey on scalable and secure access control systems and schemes in cloud computing with a key focus on cloud security. Research gaps in the existing literature on cloud security are presented.
Reference10 articles.
1. Methods for access control: Advances and limitations.;R.Ausanka-Crues;Harvey Mudd College,2001
2. An Identity Based Encryption Scheme Based on Quadratic Residues
3. A Novel Data Access Scheme in Cloud Computing
4. Access control in cloud computing environment.;A. R.Khan;Journal of Engineering and Applied Sciences (Asian Research Publishing Network),2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献