Data Security for Cloud Storage System Using Role Based Access Control
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 147 , Downloads: 125 | CTR: 85 % | Weekly Popularity: ⮙4

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Data Security for Cloud Storage System Using Role Based Access Control

Prachi Shah

A cloud storage system is collection of storage servers. A Secure cloud is a reliable source of information. Protection of the cloud is a very important task for cloud service providers. Today is the need of low-maintenance system which automates administration daily and also need of access control over network so that data security is maintained and ensured. Role-based access control (RBAC) method controls access to computer or network resources based on the roles given to individual users within an organization. Roles are defined according to job skill, authority, and responsibility within an organization. In RBAC, roles can be easily created, changed, or discontinued as the needs of an organization involve, without updating the privileges for every user.

Keywords: Role-based access control, cloud computing, role-based encryption, role-based encryption system architecture

Edition: Volume 4 Issue 1, January 2015

Pages: 305 - 307

Share this Article

How to Cite this Article?

Prachi Shah, "Data Security for Cloud Storage System Using Role Based Access Control", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15167, Volume 4 Issue 1, January 2015, 305 - 307

147 PDF Views | 125 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cloud computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 129 , Downloads: 95 | CTR: 74 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 402 , Downloads: 97 | CTR: 24 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article
Top