Data Security Policy In The Cloud Computing

被引:0
|
作者
Ran Shuanglin [1 ]
机构
[1] Guizhou Univ Nationalities, Commun Sch, Digital Media Dept, Guiyang, Peoples R China
关键词
Cloud computing; Data security; Protection strategy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive information filtering, cloud computing security gateway strategy and management to protect such as the security management, rules and regulations, safety education.
引用
收藏
页码:222 / 225
页数:4
相关论文
共 50 条
  • [1] Key Derivation Policy for data security and data integrity in cloud computing
    Senthil Kumari P.
    Nadira Banu Kamal A.R.
    [J]. Automatic Control and Computer Sciences, 2016, 50 (3) : 165 - 178
  • [2] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [3] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [4] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [5] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [6] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [7] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    [J]. PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [8] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [9] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [10] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    [J]. 2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +