High Secure and dynamic Access Control Scheme for Big Data Storage in Cloud Environment

2018 ◽  
Vol 6 (7) ◽  
pp. 1018-1022 ◽  
Author(s):  
P. Jayasree ◽  
V. Saravanan
2018 ◽  
Vol 4 (3) ◽  
pp. 341-355 ◽  
Author(s):  
Chunqiang Hu ◽  
Wei Li ◽  
Xiuzhen Cheng ◽  
Jiguo Yu ◽  
Shengling Wang ◽  
...  

2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Jianmin Wang ◽  
Yukun Xia ◽  
Wenbin Zhao ◽  
Yuhang Zhang ◽  
Feng Wu

Big data is massive and heterogeneous, along with the rapid increase in data quantity, and the diversification of user access, traditional database, and access control methods can no longer meet the requirements of big data storage and flexible access control. To solve this problem, an entity relationship completion and authority management method is proposed. By combining the weighted graph convolutional neural network and the attention mechanism, a knowledge base completion model is given. On this basis, the authority management model is formally defined and the process of multilevel trust access control is designed. The effectiveness of the proposed method is verified by experiments, and the authority management of knowledge base is more fine-grained and more secure.


2019 ◽  
Vol 479 ◽  
pp. 567-592 ◽  
Author(s):  
Yang Yang ◽  
Xianghan Zheng ◽  
Wenzhong Guo ◽  
Ximeng Liu ◽  
Victor Chang

2015 ◽  
Vol 12 (6) ◽  
pp. 106-115 ◽  
Author(s):  
Hongbing Cheng ◽  
Chunming Rong ◽  
Kai Hwang ◽  
Weihong Wang ◽  
Yanyan Li

Sign in / Sign up

Export Citation Format

Share Document