Role-Based Access-Control Backup and Restoration Ontology

Download Now
Provided by: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Topic: Cloud
Format: PDF
Cloud Computing is one the famous technology that are used today. It provides on-demand access through internet to computing different services. Privacy and security are big issues in Cloud Computing. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods in Cloud Computing ensure that only authorized the user to access system and data that helps to increase the security in the Cloud. Now-a-days researchers devoted their work access control method to enhance the security on Cloud. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC).
Download Now

Find By Topic