By Topic

To improve the current security model and efficiency in cloud computing using access control matrix

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Ilanchezhian, J. ; Comput. Sci. & Eng., Sri Manakula Vinayagar Eng. Coll., Pondicherry, India ; Varadharassu, V. ; Ranjeeth, A. ; Arun, K.

Cloud computing is the new technique adopted recently by many IT companies and business organizations, with the intention to minimize the cost spent on the data stored. There are many cloud service providers like Amazon, Microsoft, etc. By moving to a cloud servers, a department of maintaining a own data center can be eliminated and core business can be concentrated more, because the data management will be done by the cloud service providers itself. The data stored in the cloud is private and should be allowed to access only after authorization, so that only legitimate users can access the data. The access control matrix method is used to authorize the users when a request is made toward the data stored in the cloud server. But access control matrix has little flaws, these flaws can be eliminated and few improvements can be made to make the access control matrix method still efficient.

Published in:

Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on

Date of Conference:

26-28 July 2012