Skip to main content

and
  1. No Access

    Article

    Provisioning trust-oriented role-based access control for maintaining data integrity in cloud

    Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic...

    Urvashi Rahul Saxena, Taj Alam in International Journal of System Assurance … (2023)

  2. No Access

    Article

    Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

    The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud d...

    Urvashi Rahul Saxena, Taj Alam in Service Oriented Computing and Applications (2023)

  3. No Access

    Article

    Role-based access using partial homomorphic encryption for securing cloud data

    Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be in its infancy and will unfold its hidden potential by augme...

    Urvashi Rahul Saxena, Taj Alam in International Journal of System Assurance … (2023)

  4. No Access

    Article

    Role based access control using identity and broadcast based encryption for securing cloud data

    Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challeng...

    Urvashi Rahul Saxena, Taj Alam in Journal of Computer Virology and Hacking Techniques (2022)