Adaptive Security Management Model in the Cloud Computing Environment

被引:0
|
作者
Jung, Youngmin [1 ]
Chung, Mokdong [1 ]
机构
[1] Pukyong Natl Univ, Dept Comp Engn, 599-1,Daeyeon 3 Dong, Busan, South Korea
关键词
Security; Cloud Computing; Access Control; RBAC; DAA protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper suggests an adaptive access algorithm to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic changes of the common resources.
引用
收藏
页码:1664 / 1669
页数:6
相关论文
共 50 条
  • [1] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [2] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [3] A Study on the Security of Patch Management in a Cloud Computing Environment
    Hu, Yong-Xiang
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 278 - 282
  • [4] A Study on the Virtualization Security Management in the Cloud Computing Environment
    Cheong, Il-Ahn
    Lee, Seulgi
    Son, Kyungho
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2035 - 2039
  • [5] An Adaptive Defense Model for Cloud Computing Data Security
    Yang, Xing
    Xiang, Ke
    Huang, Jilan
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2025, 32 (01): : 267 - 274
  • [6] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [7] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [8] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [9] Introducing the Information Security Management System in Cloud Computing Environment
    Tot, Laslo
    Grubor, Gojko
    Marta, Takacs
    ACTA POLYTECHNICA HUNGARICA, 2015, 12 (03) : 147 - 166
  • [10] Model of assessment of risks of information security in the environment of cloud computing
    Djuraev, R. X.
    Umirzakov, B. M.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,