IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application

Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application
View Sample PDF
Author(s): Auxilia M. (Research Scholar, Sathayabama University, Chennai, India), Raja K. (Dhaanish Ahmed College of Engineering, Chennai, India)and Kannan K. (AudiSankara College of Engineering and Technology, Gudur, Nellore, India)
Copyright: 2020
Volume: 9
Issue: 1
Pages: 18
Source title: International Journal of System Dynamics Applications (IJSDA)
Editor(s)-in-Chief: Ahmad Taher Azar (College of Computer & Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia & Faculty of Computers and Artificial Intelligence, Benha University, Benha, Egypt)
DOI: 10.4018/IJSDA.2020010104

Purchase

View Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application on the publisher's website for pricing and purchasing information.

Abstract

In the evolution of social networks and big data, secure information sharing is a crucial task. When information is shared between the user and the organization admin, security plays a key role in any business organization in terms of privacy. Though many fruitful solutions prevail to protect the data integrity and privacy, there is a huge space for novel data protection schemes where a large set of data are involved. In this article, the Cloud-Based Access Control (C-BAC) framework is proposed which can fit in any business organization application. In this C-BAC, Policy Enforcement Point (PEP) is used to avoid unwanted information sharing with the neighboring employee. C-BAC framework with RSA provides security, based on the number of employees with the data handled by the particular employee, better than the existing access control framework with asymmetric encryption standard (AES) and Rivest–Shamir–Adleman (RSA) in terms of individual information handling.

Related Content

Trung-Nghia Phung, Duc-Binh Nguyen, Ngoc-Phuong Pham. © 2024. 16 pages.
Kanokwan Singha, Parthana Parthanadee, Ajchara Kessuvan, Jirachai Buddhakulsomsiri. © 2024. 14 pages.
Piyanee Akkawuttiwanich, Pisal Yenradee, Narudh Cheramakara. © 2024. 26 pages.
Waranyoo Thippo, Chorkaew Jaturanonda, Sorawit Yaovasuwanchai, Charoenchai Khompatraporn, Teeradej Wuttipornpun, Kulwara Meksawan. © 2024. 28 pages.
Porferio Almerino Jr., Marilou Martinez, Rogelio Sala Jr., Kent Maningo, Lourdes Garciano, Christine Catyong, Marvin Guinocor, Gerly Alcantara, John de Vera, Veronica Calasang, Randy Mangubat, Larry Peconcillo Jr., Emerson Peteros, Charldy Wenceslao, Rica Villarosa, Lanndon Ocampo. © 2024. 23 pages.
Porntip Junsang, Chorkaew Jaturanonda, Teeradej Wuttipornpun, Mayurachat Watcharejyothin. © 2023. 25 pages.
Supanat Sukviboon, Pisal Yenradee. © 2023. 23 pages.
Body Bottom