Dual Access Control for Cloud Storage and Sharing
In the field of distributed computing, a significant innovation is now being developed. The process of storing information is extremely difficult for every single person on the planet. Data storage and retrieval can be accomplished in the most straightforward and expedient manner possible through...
| Main Authors: | Sandeep, T.S., Shreedhara N, Hegde, C., Pui Lin |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1966/ http://eprints.intimal.edu.my/1966/2/ij2024_21r.pdf http://eprints.intimal.edu.my/1966/3/509 |
Similar Items
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024)
by: Durgadevi, ., et al.
Published: (2024)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
The Crop Price Prediction Using Machine Learning: Preliminary Stage
by: Ramya, T.K., et al.
Published: (2024)
by: Ramya, T.K., et al.
Published: (2024)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
Prediction of Fetal Health Status Using Machine Learning
by: Naidile S, Saragodu, et al.
Published: (2024)
by: Naidile S, Saragodu, et al.
Published: (2024)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Cloud-Based Enhanced Storage System Using Android Technology
by: Malathy, Batumalay, et al.
Published: (2021)
by: Malathy, Batumalay, et al.
Published: (2021)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Commerce application with multiple accessible methods / Yang Mei Lin
by: Yang , Mei Lin
Published: (2003)
by: Yang , Mei Lin
Published: (2003)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Integrated lab door access control (iLDAC)
by: Cheng, Wei Quan
Published: (2018)
by: Cheng, Wei Quan
Published: (2018)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
DEVELOPMENT OF CLOUD-BASED MEDIA PLAYER USING MICROSOFT AZURE SERVICES
by: Chong, Fong Kim, et al.
Published: (2018)
by: Chong, Fong Kim, et al.
Published: (2018)
Traffic scheduling and link sharing mechanisms for controlled load service / Chin Yun Choong
by: Chin , Yun Choong
Published: (2000)
by: Chin , Yun Choong
Published: (2000)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Prevention of Unauthorized Access to Electronic Health Records using Docker
by: Deepa Vishnu, Kodiya, et al.
Published: (2024)
by: Deepa Vishnu, Kodiya, et al.
Published: (2024)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Disaster recovery and business continuity for database services in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
Disaster recovery with minimum replica plan for reliability
checking in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
A systematic mapping study on cloud-based mobile application testing
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
E-Real Estate Management System / Sandeep Singh Mukhtiar Singh
by: Sandeep Singh, Mukhtiar Singh
Published: (2004)
by: Sandeep Singh, Mukhtiar Singh
Published: (2004)
Security access control system based on Radio Frequency Identification (RFID) and Arduino technologies
by: Ammar Faez, Mohamad Azudin
Published: (2018)
by: Ammar Faez, Mohamad Azudin
Published: (2018)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Similar Items
-
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024) -
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024) -
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024) -
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018) -
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)