Discussion on Access Control Technology of Cloud Computing

被引:0
|
作者
Wang, Yibai [1 ]
Chen, Shi [1 ]
机构
[1] Changsha Med Univ, Changsha 410219, Hunan, Peoples R China
关键词
Cloud computing; access control; key technology;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper focuses on the discussion on access control technology of cloud computing. On the basis of briefly describing the composition and principle of access control technology, this paper analyzes some problems existing in cloud computing access control. Moreover, it presents key technologies for cloud access control. It is concluded that the scientific and reasonable application of cloud computing access control technology can effectively guarantee the security of cloud computing resources to provide some help to the relevant cloud computing staff.
引用
收藏
页码:77 / 80
页数:4
相关论文
共 50 条
  • [41] Access control for Hadoop-based cloud computing
    Wang, Zhihua
    Pang, Haibo
    Li, Zhanbo
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59
  • [42] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    [J]. COMPUTING, 2017, 99 (05) : 465 - 479
  • [43] Categorical quantum cryptography for access control in cloud computing
    Qiu, Lirong
    Sun, Xin
    Xu, Juan
    [J]. SOFT COMPUTING, 2018, 22 (19) : 6363 - 6370
  • [44] A Hierarchical Access Control Technology for Cloud Storage
    Lan, Jiang
    Chunhua, Gu
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 35 - 40
  • [45] Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing
    Satoh, Ichiro
    [J]. 14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 174 - 181
  • [46] Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer
    ZHANG Xian
    PENG Mugen
    [J]. ZTE Communications, 2017, 15 (04) : 47 - 66
  • [47] Using the Pairing Function for Distributed Access Control in Cloud Computing
    Wan, Changsheng
    Zhang, Juan
    Zhou, Lin
    Qin, Zhongyuan
    [J]. ADVANCED TECHNOLOGIES IN MANUFACTURING, ENGINEERING AND MATERIALS, PTS 1-3, 2013, 774-776 : 1745 - +
  • [48] Dynamic access control of encrypted data in cloud computing environment
    Xiang, Shuaiqiu
    Zhu, Zhenjia
    [J]. International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [49] A survey of privacy-preserving access control in cloud computing
    [J]. Li, Hongjiao, 1600, Binary Information Press (10):
  • [50] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    [J]. CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50