Encryption techniques & access control models for data security: A survey

8Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud. When information is moving from one node to another node, security is a big challenge. When information is stored on the user's computer, it is under control but when it is in movement user lose control over it. In the world of security, to convert information from one form to another form, Encryption is used, so that only authorized party will able to read. Encryption is a technique for any security-conscious organization. In this paper, we present basic access control models alongwith encryption techniques.

Cite

CITATION STYLE

APA

Dixit, R., & Ravindranath, K. (2018). Encryption techniques & access control models for data security: A survey. International Journal of Engineering and Technology(UAE), 7(1.5 Special Issue  5), 107–110. https://doi.org/10.14419/ijet.v7i1.5.9130

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free