![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic...
-
Article
Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems
The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud d...
-
Article
Role-based access using partial homomorphic encryption for securing cloud data
Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be in its infancy and will unfold its hidden potential by augme...
-
Chapter and Conference Paper
Secure & Trusted Framework for Cloud Services Recommendation-A Systematic Review
A dependable technology that gives us access to the with a confidential and secure environment that can be adaptable to the needs of consumers. With the help of cloud data storage, it is now feasible to store ...
-
Article
Role based access control using identity and broadcast based encryption for securing cloud data
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challeng...