Discussion on Access Control Technology of Cloud Computing

被引:0
|
作者
Wang, Yibai [1 ]
Chen, Shi [1 ]
机构
[1] Changsha Med Univ, Changsha 410219, Hunan, Peoples R China
关键词
Cloud computing; access control; key technology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper focuses on the discussion on access control technology of cloud computing. On the basis of briefly describing the composition and principle of access control technology, this paper analyzes some problems existing in cloud computing access control. Moreover, it presents key technologies for cloud access control. It is concluded that the scientific and reasonable application of cloud computing access control technology can effectively guarantee the security of cloud computing resources to provide some help to the relevant cloud computing staff.
引用
收藏
页码:77 / 80
页数:4
相关论文
共 50 条
  • [21] Categorical quantum cryptography for access control in cloud computing
    Lirong Qiu
    Xin Sun
    Juan Xu
    [J]. Soft Computing, 2018, 22 : 6363 - 6370
  • [22] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [23] Access control requirements for structured document in cloud computing
    Yao, Zhiqiang
    Xiong, Jinbo
    Ma, Jianfeng
    Li, Qi
    Liu, Ximeng
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 95 - 102
  • [24] Server-aided access control for cloud computing
    WENG Jian
    WENG Jia-si
    LIU Jia-nan
    HOU Lin
    [J]. 网络与信息安全学报, 2016, 2 (10) : 58 - 76
  • [25] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [26] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    [J]. Computing, 2017, 99 : 465 - 479
  • [27] Survey of access control models and technologies for cloud computing
    Fangbo Cai
    Nafei Zhu
    Jingsha He
    Pengyu Mu
    Wenxin Li
    Yi Yu
    [J]. Cluster Computing, 2019, 22 : 6111 - 6122
  • [28] Research on Access Control Techniques in SaaS of Cloud Computing
    Rehman, Shabana
    Gautam, Rahul
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 92 - 100
  • [29] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [30] Critical Comparison of Access Control Models for Cloud Computing
    Beraka, Mutaz
    Al-Muhtadi, Jalal
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 431 - 442