The Cloud Data Security and Access Control Model in the Study

被引:0
|
作者
Dong, Jing [1 ]
机构
[1] Qujing Normal Coll, Qujing 655001, Yunnan, Peoples R China
关键词
Cloud computing; Utility security; Access control; Strategy optimization and security analysis;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cloud computing is a kind of based on the calculation of the Internet, through the cloud computing, to other computers and other devices to share information and resources. Although it can bring convenience, operated and managed in a cloud computing infrastructure services in the security problem of nots allow to ignore. After the cloud security problem analysis, put forward the safety of the infrastructure services is the foundation of cloud computing security. Then, on the basis of the traditional access control model to take into consideration the characteristics of cloud computing infrastructure services, design a set of access control model. The model well enhanced the security of cloud computing infrastructure services. Cloud computing is a kind of new IT services based on Internet, use and delivery mode, cloud computing can through the Internet provides a variety of resources, dynamic easy extension and these resources can be virtualized. It means that the computing power can become a circulation of commodities in the Internet.
引用
收藏
页码:498 / 500
页数:3
相关论文
共 50 条
  • [1] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [2] Study on Access Control for Cloud Storage Security
    Ma, Xinqiang
    Huang, Yi
    Zhang, Mingsheng
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 333 - 336
  • [3] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [4] On the Security of Data Access Control for Multiauthority Cloud Storage Systems
    Wu, Xianglong
    Jiang, Rui
    Bhargava, Bharat
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (02) : 258 - 272
  • [5] A Robust Lightweight Data Security Model for Cloud Data Access and Storage
    Pajany, M.
    Zayaraz, G.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2021, 16 (03) : 39 - 53
  • [6] Research on Data Security Access Model of Cloud Computing Platform
    Zhu, Yangqing
    Zuo, Jun
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 424 - 428
  • [7] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    [J]. CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [8] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    [J]. High Technology Letters, 2015, 21 (02) : 200 - 204
  • [9] A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data
    Alabdulatif, Abdullah
    Thilakarathne, Navod Neranjan
    Kalinaki, Kassim
    [J]. ELECTRONICS, 2023, 12 (12)
  • [10] An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud
    Alharbe, Nawaf
    Aljohani, Abeer
    Rakrouki, Mohamed Ali
    Khayyat, Mashael
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (05):