z-logo
open-access-imgOpen Access
Evaluation of Access Control Techniques in Cloud Computing
Author(s) -
Devyani Patil,
Nilesh Mahajan
Publication year - 2020
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2020920130
Subject(s) - computer science , cloud computing , access control , control (management) , data science , computer security , operating system , artificial intelligence
Cloud Computing is an advanced evolving technology. It is a technology in which authorised user can store, retrieve and delete data from cloud computing environment. Mostly it is used for storage of data because now a day’s storage of data in safe space is a critical problem. Data kept in cloud can be retrieved any time and at any place, if you are legitimate user and having internet access. Main benefit of use of this technology is you don’t worry about the data storage capacity, equipment purchasing and access speed. Even with of this technology data sharing is very easy. According to use of this technology cloud computing is categorised into service models as SaaS, PassS and IaaS. As data security is depends on user authentication it is also depends on access control.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom