Verifiable computation with access control in cloud computing

2013 ◽  
Vol 69 (2) ◽  
pp. 528-546 ◽  
Author(s):  
Lingling Xu ◽  
Shaohua Tang
NCICCNDA ◽  
2018 ◽  
Author(s):  
Kavya P ◽  
Manjula S ◽  
Neethu Kuwar ◽  
Nikitha R ◽  
Gururaj KS

Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Author(s):  
Cheng-Yu Cheng ◽  
Hang Liu ◽  
Li-Tse Hsieh ◽  
Edward Colbert ◽  
Jin-Hee Cha

2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


Sign in / Sign up

Export Citation Format

Share Document