A similarity-aware encrypted deduplication scheme with flexible access control in the cloud.
Yukun ZhouDan FengYu HuaWen XiaMin FuFangting HuangYucheng ZhangPublished in: Future Gener. Comput. Syst. (2018)
Keyphrases
- access control
- security model
- fine grained
- data security
- dynamic access control
- security policies
- protection schemes
- cloud computing
- access control policies
- role based access control
- security mechanisms
- access control models
- identity management
- role based access control model
- security analysis
- security requirements
- rbac model
- discretionary access control
- role assignment
- digital rights management
- access control mechanism
- security architecture
- encryption algorithm