Research Anthology on Artificial Intelligence Applications in Security 2020
DOI: 10.4018/978-1-7998-7705-9.ch042
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing

Abstract: Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…Access control technology is an important tool. It allows legitimate users to gain access to information and system resources within legitimate time periods and prevent unauthorized users from accessing information and system resources by denying the access [10,11].Access control can be considered from two aspects: authentication and authority [12,13].Authentications services checks and confirm user identity through a secret code like password and verify whether the information of the user given is real or not. The key purpose of authentication is to enhance the security and get rid of the illegal access of data and also minimize the attacks like password stolen done by the attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Access control technology is an important tool. It allows legitimate users to gain access to information and system resources within legitimate time periods and prevent unauthorized users from accessing information and system resources by denying the access [10,11].Access control can be considered from two aspects: authentication and authority [12,13].Authentications services checks and confirm user identity through a secret code like password and verify whether the information of the user given is real or not. The key purpose of authentication is to enhance the security and get rid of the illegal access of data and also minimize the attacks like password stolen done by the attackers.…”
Section: Introductionmentioning
confidence: 99%