PpBAC: Popularity Based Access Control Model for Cloud Computing

[1]  Ganesh Chandra Deka,et al.  An Overview on the Virtualization Technology , 2014 .

[2]  Saroj K. Biswas,et al.  Redundancy-driven modified Tomek-link based undersampling: A solution to class imbalance , 2017, Pattern Recognit. Lett..

[3]  Muthu Ramachandran,et al.  Towards performance evaluation of cloud service providers for cloud data security , 2016, Int. J. Inf. Manag..

[4]  Huang Xiuli,et al.  Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.

[5]  Pinki Roy,et al.  A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..

[6]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[7]  S. Namasudra,et al.  CLOUD COMPUTING: A NEW ERA , 2018 .

[8]  Pinki Roy,et al.  Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[9]  M. Auxilia,et al.  Ontology Centric Access Control Mechanism for Enabling Data Protection in Cloud , 2016 .

[10]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  Pinki Roy,et al.  A new secure authentication scheme for cloud computing environment , 2017, Concurr. Comput. Pract. Exp..

[12]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[13]  Gail-Joon Ahn,et al.  Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[14]  Jie Wu,et al.  A connectivity-based popularity prediction approach for social networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[15]  Pinki Roy,et al.  Time saving protocol for data accessing in cloud computing , 2017, IET Commun..

[16]  Abdul Raouf Khan,et al.  ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .

[17]  Min Lei,et al.  MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.

[18]  Jaya Jeswani,et al.  Activity Based Access Control Model for Cloud Computing , 2015 .

[19]  Pinki Roy,et al.  Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..

[20]  Abhishek Majumder,et al.  Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[21]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[22]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[23]  Abhishek Majumder,et al.  Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .

[24]  Rui Jiang,et al.  A Novel Data Access Scheme in Cloud Computing , 2012 .

[25]  Pinki Roy,et al.  Time efficient secure DNA based access control model for cloud computing environment , 2017, Future Gener. Comput. Syst..

[26]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[27]  Lili Sun,et al.  A purpose based usage access control model , 2010 .