Insulata J et al. - Google Patents
Enhancing Cloud Security: E-Abac with Aes for Robust User Revocation MechanismsInsulata J et al.
View PDF- Document ID
- 3316590985334395611
- Author
- Insulata J I
- Roselin J
- Publication venue
- J., Enhancing Cloud Security: E-Abac with Aes for Robust User Revocation Mechanisms
External Links
Snippet
In the digital era, the exponential growth in cloud computing usage has heightened security concerns, particularly the necessity for efficient user revocation mechanisms to prevent unauthorized access by former employees. Traditional approaches often grapple with high …
- 230000007246 mechanism 0 title abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
More et al. | Third party public auditing scheme for cloud storage | |
EP2396921B1 (en) | Trusted cloud computing and services framework | |
EP2396922B1 (en) | Trusted cloud computing and services framework | |
EP2890084B1 (en) | A data securing system and method | |
US8856530B2 (en) | Data storage incorporating cryptographically enhanced data protection | |
EP3398073B1 (en) | Securely storing and distributing sensitive data in a cloud-based application | |
EP3785409B1 (en) | Data message sharing | |
Perwej | The hadoop security in big data: a technological viewpoint and analysis | |
Manjusha et al. | Secure authentication and access system for cloud computing auditing services using associated digital certificate | |
Kumar | Cryptography during data sharing and accessing over cloud | |
Tiwari et al. | A novel secure cloud storage architecture combining proof of retrievability and revocation | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
Takaoğlu et al. | The Impact of Self-Sovereign Identities on CyberSecurity | |
Yang et al. | New paradigm of inference control with trusted computing | |
Insulata J et al. | Enhancing Cloud Security: E-Abac with Aes for Robust User Revocation Mechanisms | |
Banerjee et al. | A nobel cryptosystem for group data sharing in cloud storage | |
US11962691B1 (en) | Systems, methods, and media for generating and using a multi-signature token for electronic communication validation | |
Exceline et al. | Existing enabling technologies and solutions to maintain privacy and security in healthcare records | |
Kodada | FSAaCIT: Finite State Automata based One-Key Cryptosystem and Chunk-based Indexing Technique for Secure Data De-duplication in Cloud Computing | |
ALnwihel et al. | A Novel Cloud Authentication Framework | |
Thangavel et al. | A survey on security over data outsourcing | |
Sohal et al. | Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment | |
Zhu et al. | Research on data security access model of cloud computing platform | |
Pardeshi et al. | Enhancing data dynamics and storage security for cloud computing using merkle hash tree and AES algorithms |