Skip to main content

and
  1. No Access

    Article

    Provisioning trust-oriented role-based access control for maintaining data integrity in cloud

    Cloud computing platforms have been one of the best sources for resource computation and service recommendations in the recent years. Users’ reliance on the cloud has increased dramatically during the pandemic...

    Urvashi Rahul Saxena, Taj Alam in International Journal of System Assurance … (2023)

  2. No Access

    Article

    Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

    The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and privacy should be maintained for the data uploaded on the cloud d...

    Urvashi Rahul Saxena, Taj Alam in Service Oriented Computing and Applications (2023)

  3. No Access

    Article

    Role-based access using partial homomorphic encryption for securing cloud data

    Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be in its infancy and will unfold its hidden potential by augme...

    Urvashi Rahul Saxena, Taj Alam in International Journal of System Assurance … (2023)

  4. No Access

    Chapter and Conference Paper

    Secure & Trusted Framework for Cloud Services Recommendation-A Systematic Review

    A dependable technology that gives us access to the with a confidential and secure environment that can be adaptable to the needs of consumers. With the help of cloud data storage, it is now feasible to store ...

    Urvashi Rahul Saxena, Parth Sharma, Gaurav Gupta in Decision Intelligence Solutions (2023)

  5. No Access

    Article

    Role based access control using identity and broadcast based encryption for securing cloud data

    Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challeng...

    Urvashi Rahul Saxena, Taj Alam in Journal of Computer Virology and Hacking Techniques (2022)