Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud.
Xue YangRongxing LuJun ShaoXiaohu TangAli A. GhorbaniPublished in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
- access control
- user defined
- data security
- identity management
- security mechanisms
- security model
- security requirements
- fine grained
- access control mechanism
- security architecture
- security policies
- dynamic access control
- rbac model
- unauthorized access
- role based access control
- data protection
- xml access control
- cloud computing
- data types
- database security
- discretionary access control
- access control models
- access control policies
- authentication and access control
- rights management
- security analysis
- access control systems
- resource constrained
- protection schemes
- operating system