Attribute-Based Access Control for Secure Cloud Storage Structure Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48047/nq.2020.18.8.nq20240
This research presents a novel approach to safe access procedure in cloud storage structure by addressing the challenges associated with managing and distributing complex secret keys.The proposed procedure utilizes attribute-based access control and incorporates a client process, an authentication terminal process, and a storage terminal process.The client generates a main secret key and public parameters for each user using an attribute password mechanism.The authentication terminal maintains user attribute, file attribute, and attribute secret key databases.Access control is determined by constructing an access control string from the attributes of the user, file, and file operation type, enabling fine-grained access control and accommodating large-scale user dynamic expansion.Consequently, the access control costs of the cloud storage structure are significantly reduced, while offering a flexible, effective, and secure access control mechanism for safe storage structure access.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.48047/nq.2020.18.8.nq20240
- https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=true
- OA Status
- gold
- References
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4388376807
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4388376807Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48047/nq.2020.18.8.nq20240Digital Object Identifier
- Title
-
Attribute-Based Access Control for Secure Cloud Storage StructureWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-11-05Full publication date if available
- Authors
-
M Sampoornam, C. Ramesh Kumar, S. DeviList of authors in order
- Landing page
-
https://doi.org/10.48047/nq.2020.18.8.nq20240Publisher landing page
- PDF URL
-
https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=trueDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=trueDirect OA link when available
- Concepts
-
Cloud storage, Cloud computing, Computer science, Access control, Computer security, Database, Computer network, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
3Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4388376807 |
|---|---|
| doi | https://doi.org/10.48047/nq.2020.18.8.nq20240 |
| ids.doi | https://doi.org/10.48047/nq.2020.18.8.nq20240 |
| ids.openalex | https://openalex.org/W4388376807 |
| fwci | 0.0 |
| type | article |
| title | Attribute-Based Access Control for Secure Cloud Storage Structure |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.996999979019165 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T10927 |
| topics[1].field.id | https://openalex.org/fields/33 |
| topics[1].field.display_name | Social Sciences |
| topics[1].score | 0.9926000237464905 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/3312 |
| topics[1].subfield.display_name | Sociology and Political Science |
| topics[1].display_name | Access Control and Trust |
| topics[2].id | https://openalex.org/T10237 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9846000075340271 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptography and Data Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2777059624 |
| concepts[0].level | 3 |
| concepts[0].score | 0.6947463750839233 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q914359 |
| concepts[0].display_name | Cloud storage |
| concepts[1].id | https://openalex.org/C79974875 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6740739345550537 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[1].display_name | Cloud computing |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6663951873779297 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C527821871 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6160745024681091 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q228502 |
| concepts[3].display_name | Access control |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4255751669406891 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C77088390 |
| concepts[5].level | 1 |
| concepts[5].score | 0.3544594943523407 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[5].display_name | Database |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3316296339035034 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.25696873664855957 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cloud-storage |
| keywords[0].score | 0.6947463750839233 |
| keywords[0].display_name | Cloud storage |
| keywords[1].id | https://openalex.org/keywords/cloud-computing |
| keywords[1].score | 0.6740739345550537 |
| keywords[1].display_name | Cloud computing |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6663951873779297 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/access-control |
| keywords[3].score | 0.6160745024681091 |
| keywords[3].display_name | Access control |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.4255751669406891 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/database |
| keywords[5].score | 0.3544594943523407 |
| keywords[5].display_name | Database |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.3316296339035034 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/operating-system |
| keywords[7].score | 0.25696873664855957 |
| keywords[7].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.48047/nq.2020.18.8.nq20240 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=true |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | NeuroQuantology |
| locations[0].landing_page_url | https://doi.org/10.48047/nq.2020.18.8.nq20240 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5097249732 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | M Sampoornam |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | M Sampoornam |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| authorships[1].author.id | https://openalex.org/A5101757058 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-8358-4106 |
| authorships[1].author.display_name | C. Ramesh Kumar |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | C Kumar |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| authorships[2].author.id | https://openalex.org/A5091298969 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-0153-6283 |
| authorships[2].author.display_name | S. Devi |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | S Devi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Information Technology, J.J. College of Engineering and Technology, Trichy, Tamilnadu |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=true |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-11-06T00:00:00 |
| display_name | Attribute-Based Access Control for Secure Cloud Storage Structure |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.996999979019165 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W4244478748, https://openalex.org/W4223488648, https://openalex.org/W4205786897, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W3150465815, https://openalex.org/W1997222214, https://openalex.org/W2070395303, https://openalex.org/W3020139090, https://openalex.org/W2796974977 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.48047/nq.2020.18.8.nq20240 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=true |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | NeuroQuantology |
| best_oa_location.landing_page_url | https://doi.org/10.48047/nq.2020.18.8.nq20240 |
| primary_location.id | doi:10.48047/nq.2020.18.8.nq20240 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://neuroquantology.com/open-access/Attribute-Based+Access+Control+for+Secure+Cloud+Storage+Structure_12548/?download=true |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | NeuroQuantology |
| primary_location.landing_page_url | https://doi.org/10.48047/nq.2020.18.8.nq20240 |
| publication_date | 2023-11-05 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2924667697, https://openalex.org/W2945857063, https://openalex.org/W2766108168 |
| referenced_works_count | 3 |
| abstract_inverted_index.a | 3, 34, 42, 48, 119 |
| abstract_inverted_index.an | 37, 59, 80 |
| abstract_inverted_index.by | 14, 78 |
| abstract_inverted_index.in | 10 |
| abstract_inverted_index.is | 76 |
| abstract_inverted_index.of | 87, 109 |
| abstract_inverted_index.to | 6 |
| abstract_inverted_index.and | 21, 32, 41, 52, 70, 91, 99, 122 |
| abstract_inverted_index.are | 114 |
| abstract_inverted_index.for | 55, 127 |
| abstract_inverted_index.key | 51, 73 |
| abstract_inverted_index.the | 16, 85, 88, 105, 110 |
| abstract_inverted_index.This | 0 |
| abstract_inverted_index.each | 56 |
| abstract_inverted_index.file | 68, 92 |
| abstract_inverted_index.from | 84 |
| abstract_inverted_index.main | 49 |
| abstract_inverted_index.safe | 7, 128 |
| abstract_inverted_index.user | 57, 66, 102 |
| abstract_inverted_index.with | 19 |
| abstract_inverted_index.cloud | 11, 111 |
| abstract_inverted_index.costs | 108 |
| abstract_inverted_index.file, | 90 |
| abstract_inverted_index.novel | 4 |
| abstract_inverted_index.type, | 94 |
| abstract_inverted_index.user, | 89 |
| abstract_inverted_index.using | 58 |
| abstract_inverted_index.while | 117 |
| abstract_inverted_index.access | 8, 30, 81, 97, 106, 124 |
| abstract_inverted_index.client | 35, 46 |
| abstract_inverted_index.public | 53 |
| abstract_inverted_index.secret | 24, 50, 72 |
| abstract_inverted_index.secure | 123 |
| abstract_inverted_index.string | 83 |
| abstract_inverted_index.access. | 131 |
| abstract_inverted_index.complex | 23 |
| abstract_inverted_index.control | 31, 75, 82, 98, 107, 125 |
| abstract_inverted_index.dynamic | 103 |
| abstract_inverted_index.storage | 12, 43, 112, 129 |
| abstract_inverted_index.approach | 5 |
| abstract_inverted_index.enabling | 95 |
| abstract_inverted_index.keys.The | 25 |
| abstract_inverted_index.managing | 20 |
| abstract_inverted_index.offering | 118 |
| abstract_inverted_index.password | 61 |
| abstract_inverted_index.presents | 2 |
| abstract_inverted_index.process, | 36, 40 |
| abstract_inverted_index.proposed | 26 |
| abstract_inverted_index.reduced, | 116 |
| abstract_inverted_index.research | 1 |
| abstract_inverted_index.terminal | 39, 44, 64 |
| abstract_inverted_index.utilizes | 28 |
| abstract_inverted_index.attribute | 60, 71 |
| abstract_inverted_index.flexible, | 120 |
| abstract_inverted_index.generates | 47 |
| abstract_inverted_index.maintains | 65 |
| abstract_inverted_index.mechanism | 126 |
| abstract_inverted_index.operation | 93 |
| abstract_inverted_index.procedure | 9, 27 |
| abstract_inverted_index.structure | 13, 113, 130 |
| abstract_inverted_index.addressing | 15 |
| abstract_inverted_index.associated | 18 |
| abstract_inverted_index.attribute, | 67, 69 |
| abstract_inverted_index.attributes | 86 |
| abstract_inverted_index.challenges | 17 |
| abstract_inverted_index.determined | 77 |
| abstract_inverted_index.effective, | 121 |
| abstract_inverted_index.parameters | 54 |
| abstract_inverted_index.large-scale | 101 |
| abstract_inverted_index.process.The | 45 |
| abstract_inverted_index.constructing | 79 |
| abstract_inverted_index.distributing | 22 |
| abstract_inverted_index.fine-grained | 96 |
| abstract_inverted_index.incorporates | 33 |
| abstract_inverted_index.accommodating | 100 |
| abstract_inverted_index.mechanism.The | 62 |
| abstract_inverted_index.significantly | 115 |
| abstract_inverted_index.authentication | 38, 63 |
| abstract_inverted_index.attribute-based | 29 |
| abstract_inverted_index.databases.Access | 74 |
| abstract_inverted_index.expansion.Consequently, | 104 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.26425888 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |