Data Security in Cloud Storage using RBAC
Author(s):
Mr. Harshal Ashokrao Karande
Keywords:
Role-Based Access Control, Role-Based Encryption, Time-Based Assured Detection, Key-Manager, Cloud Storage
Abstract
A cloud storage system is a collection of storage servers , provides long term storage services over the web. Storing knowledge in an exceedingly third party cloud system causes serious concern over knowledge confidentiality. A Secure cloud is a trustworthy source of information. Protecting the cloud is a very important task for cloud storage service providers. Now days, there is the need of low-maintenance system which automates administration regularly and also need of access control over network so that data security is maintained and insured. Role-based access control (RBAC) method controls access to computer or network resources based on the roles given to individual users within an enterprise. Roles are defined according to job skill, authority, and responsibility. The system provides policy access control and assured deletion. Assured deletion aims to provide cloud client on option of truly destroying their data backups upon request.
Article Details
Unique Paper ID: 142508

Publication Volume & Issue: Volume 2, Issue 2

Page(s): 195 - 201
Article Preview & Download


Share This Article

Conference Alert

NCSST-2023

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2023

Go To Issue



Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews