Views provided by UsageCounts
User assigning permission policies to computer systems, proper authorization is a significant problem. In recent years, open systems and dispersed platforms like the cloud have raised considerable concerns about this issue. The RBAC has been utilized extensively in server applications of the cloud because it is a popular and versatile technique. When authorization access to data stored in the cloud occurs to collect proof against offenders, the "computer forensic investigation" steps into action. the cloud service provider is no longer a dependable business, the system should offer data confidentiality. Additionally, a suitable revocation procedure should be offered to manage this person once their credential has expired. Component failures have become increasingly prevalent as storage systems scale up and spread across larger networks, raising the bar for fault tolerance. We describe a secure data-sharing system that enables secure key distribution and data sharing for dynamic groups using role-based access control and AES encryption technology. data recovery stores duplicate data to withstand a certain degree of data loss. To secure the data that is present across distributed systems, the erasure code method is used. The cost of data storage appears to be able to be greatly decreased while keeping the same level of resilience against disc failures with current erasure coding techniques as Reed-Solomon codes. In addition to an even greater access delay, its repair costs are far higher. According to this viewpoint, the creation of creative coding techniques for cloud storage systems has garnered a lot of interest from both the academic and corporate worlds. This research goal is to provide a new coding scheme that boosts the efficiency of the Reed-Solomon coding technique, which uses the sophisticated Cauchy matrix to achieve fault tolerance.
Role Based Access Control, AES, Cloud data security, Multi Authority Access Control, Forensic Investigation, Proxy Key, Cauchy matrix, Reed-Solomon codes, data recovery, Revocable-Storage.
Role Based Access Control, AES, Cloud data security, Multi Authority Access Control, Forensic Investigation, Proxy Key, Cauchy matrix, Reed-Solomon codes, data recovery, Revocable-Storage.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 6 |

Views provided by UsageCounts