Data Security for Cloud Storage System Using Role Based Access Control

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

"A cloud storage system is collection of storage servers. A Secure cloud is a reliable source of information. Protection of the cloud is a very important task for cloud service providers. Today is the need of low-maintenance system which automates administration daily and also need of access control over network so that data security is maintained and ensured. Role-based access control (RBAC) method controls access to computer or network resources based on the roles given to individual users within an organization. Roles are defined according to job skill, authority, and responsibility within an organization. In RBAC, roles can be easily created, changed, or discontinued as the needs of an organization involve, without updating the privileges for every user. "

Authors and Affiliations

Keywords

Related Articles

Variation in the Incidence and Position of Accessory Mandibular Foramen in East Indian Population in Relation to Age

"ABSTRACT : The passage of blood vessels and nerves make the accessory mandibular foramen (AMF) clinically important for dental surgeons, anaesthesists, oncologists and radiotherapists. The aim of the pr...

Comparative Beta Analysis of MRF Ltd and APOLLO Tyres

An investor interested in staying invested in stock market would always keep an eye on the beta of the stock. Beta is the critical factor which influences the decisions of the investor. Beta calculates the risk of a part...

Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Patients

Recently, in many cases, the reason for a patient staying in the hospital is not that he or she actually needs active medical care. Often, the principal reason for a lengthy stay in the hospital is simply continual obser...

RC Snubber Circuit Design for Thyristor using Turn-Off Model in Pspice

In this paper, we present a typical RC snubber circuit design procedure for a phase controlled thyristor by considering reverse recovery process. In the snubber circuit design of high power electronic circuits, the rever...

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

"We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of "

Download PDF file
  • EP ID EP339468
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

(2015). Data Security for Cloud Storage System Using Role Based Access Control. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-339468