Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 24
Page No. 7619 - 7632

A Hybrid RBAC and Chaos Access (HRCA) Control Mechanism for Cloud Computing Environment

Authors : G. Venifa Mini and K.S. Angel Viji

References

Ali, K.H., D. Greenwood, J.W. Smith and I. Sommerville, 2012. The cloud adoption toolkit: Supporting cloud adoption decisions in the enterprise. Software Pract. Experience, 42: 447-465.
CrossRef  |  Direct Link  |  

Armbrust, M., A. Fox, R. Griffith, A.D. Joseph and R. Katz et al., 2010. A view of cloud computing. Commun. ACM, 53: 50-58.
CrossRef  |  Direct Link  |  

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP'07.), May 20-23, IEEE, New York, USA., ISBN:0-7695-2848-1, pp: 321-334.

Damiani, M.L, E. Bertino, B. Catania and P. Perlasca, 2007. GEO-RBAC: A spatially aware RBAC. ACM Transa. Inform. Syst. Secur., 10: 1-42.
CrossRef  |  Direct Link  |  

Dawn, S., E. Shi, I. Fischer and U. Shankar, 2012. Cloud data protection for the masses. Comput., 45: 39-45.
CrossRef  |  Direct Link  |  

DiVimercati, S.D.C., S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati, 2007. Over-encryption: Management of access control evolution on outsourced data. Proceedings of the 33rd International Conference on Very large Data Bases, September 23-28, 2007, VLDB Endowment Inc., Austria, ISBN: 978-1-59593-649-3, pp: 123-134.

Foster, I., Y. Zhao, I. Raicu and S. Lu, 2008. Cloud computing and grid computing 360-degree compared. Proceedings of the Workshop on Grid Computing Environments GCE'08, November 12-16, 2008, IEEE., Austin, Texas, USA., pp: 1-10.

Hariri, S., P. Varshney, L. Zhou, V.V. Menon and S. Ghaya, 1999. A hierarchical analysis approach for high performance computing and communication applications. Proceedings of the 32nd Hawaii International Conference on System Sciences, January 1, 1999, IEEE Computer Society Washington, DC, USA., pp: 1-8.

Hawang, K. and D. Li, 2010. Trusted cloud computing with secure resources and data coloring. IEEE Comput. Soc., 14: 14-22.
Direct Link  |  

Marston, S., Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, 2011. Cloud computing: The business perspective. Decis. Supp. Syst., 51: 176-189.
CrossRef  |  Direct Link  |  

Osborn, S., R. Sandhu and Q. Munawer, 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inform. Syst. Secur., 3: 85-106.
CrossRef  |  Direct Link  |  

Rost, P., C.J. Bernardos, A.D. Domenico, M.D. Girolamo and M. Lalam et al., 2014. Cloud technologies for flexible 5G radio access networks. IEEE. Commun. Mag., 52: 68-76.
CrossRef  |  Direct Link  |  

Sekhar, B.R., B.S. Kumar, L.S. Reddy and V.P. Chandar, 2012. CP-ABE based encryption for secured cloud storage access. Intl. J. Sci. Eng. Res., 3: 1-5.

Victor, E., L.M. Liebrock and D. Shin, 2010. Permission management system: Permission as a service in cloud computing. Proceedings of the IEEE 34th Annual Conference on Computer Software and Applications Conference Workshops (COMPSACW), July 19-23, 2010, IEEE, Seoul, Korea, ISBN:978-1-4244-8089-0, 371-375.

Zhou, L., V. Varadharajan and M. Hitchens, 2011. Enforcing role-based access control for secure data storage in the cloud. Comput. J., 54: 1675-1687.
Direct Link  |  

Zhou, M., R. Zhang, W. Xie, W. Qian and A. Zhou, 2010. Security and privacy in cloud computing: A survey. Proceedings of the 6th IEEE International Conference on Semantics Knowledge and Grid (SKG), November 1-3, 2010, IEEE, Beijing, China, ISBN:978-1-4244-8125-5, pp: 105-112.

Zomaya, A.Y. and Y.C. Lee, 2012. Energy Efficient Distributed Computing Systems. Vol. 88, John Wiley & Sons, Hoboken, New Jersey,.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved