Data Security for Cloud Storage System victimization Role primarily based Access management
Author(s):
Dashrath Patil , Dr DY Patil Institute of Engineering and Technology,Pune; Mahesh Jagtap, Dr DY Patil Institute of Engineering and Technology,Pune; Yogesh Wadekar, Dr DY Patil Institute of Engineering and Technology,Pune
Keywords:
Role-Based Access Control, Cloud Computing, Role-Based Encryption, Role-Based Encryption System Architecture, Knowledge Recovery
Abstract:
Nowadays Data Security is a most important aspect of cloud Computing. A cloud storage system is assortment of storage servers. A Secure cloud could be a reliable supply of data. Protection of the cloud is a important task for cloud service suppliers. These days it might like of low-maintenance system that automates administration and to boot would like of managing access over network thus information security is maintained and ensured. Role-based access management (RBAC) methodology controls access to laptop or network resources supported the roles given to individual users inside a corporation. Roles square measure outlined consistent with job ability, authority, and responsibility inside a corporation. In RBAC, roles will be simply created, changed, or out of print because the desires of a corporation involve, while not change the privileges for each user. Data recovery is additionally a decent options of information security similarly as retrieval we have a tendency to also gift an inspiration of information recovery from cloud similarly as from native server.
Other Details:
| Manuscript Id | : | IJSTEV2I3047
|
| Published in | : | Volume : 2, Issue : 3
|
| Publication Date | : | 01/10/2015
|
| Page(s) | : | 163-165
|
Download Article