![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic...
-
Article
Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud d...
-
Article
Role-based access using partial homomorphic encryption for securing cloud data
Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be in its infancy and will unfold its hidden potential by augme...
-
Article
Role based access control using identity and broadcast based encryption for securing cloud data
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challeng...