UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 2
February-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2002390


Registration ID:
228615

Page Number

1235-1238

Share This Article


Jetir RMS

Title

SURVEY ON ACCESS CONTROL TECHNIQUES IN CLOUD COMPUTING

Abstract

Distributed computing is one of the most raising innovations that is being utilized broadly in the ongoing years. Distributed computing is the on-request accessibility of PC framework assets, particularly information stockpiling and registering power, without direct dynamic administration by the client. There has been a developing pattern to utilize cloud information stockpiling for enormous scope information stockpiling. Distributed computing is an Internet based figuring where the data innovation assets are given to end clients following their solicitation. Distributed computing has been received as of late by numerous IT organizations and associations, to limit the cost spent on information stockpiling. With this innovation, clients and organizations can get to projects, stockpiling, and application advancement stages through the Internet and by means of the administrations offered by the cloud specialist co-ops (CSPs). Right now propose an entrance control model to accomplish information classification and versatility. As there are different access control procedures in distributed computing Attribute Based Access Control (ABAC) has increased more significance. Here access is allowed dependent on quality. Right now we present a far reaching audit of access control components utilized in the distributed computing condition. The preferences and weaknesses of every one of these models are talked about and introduced alongside their examination. Likewise, we study the cloud prerequisites of these models, and we assess control components against these necessities

Key Words

Data storage, access control, cloud computing

Cite This Article

"SURVEY ON ACCESS CONTROL TECHNIQUES IN CLOUD COMPUTING", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 2, page no.1235-1238, February-2020, Available :http://www.jetir.org/papers/JETIR2002390.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"SURVEY ON ACCESS CONTROL TECHNIQUES IN CLOUD COMPUTING", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 2, page no. pp1235-1238, February-2020, Available at : http://www.jetir.org/papers/JETIR2002390.pdf

Publication Details

Published Paper ID: JETIR2002390
Registration ID: 228615
Published In: Volume 7 | Issue 2 | Year February-2020
DOI (Digital Object Identifier):
Page No: 1235-1238
Country: chikmanglore, karnataka, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002938

Print This Page

Current Call For Paper

Jetir RMS