A cloud access control system based on privacy protection

A cloud access control system based on privacy protection Nanjing University of Posts and telecommunications Shaojiu This paper presents a new access control model in cloud computing environment, which can not only provide efficient and flexible access control strategy in complex and changeable cloud environment, but also have the ability to protect the privacy data in Mah-abe. This paper focuses on the principle of the ABE encryption algorithm, in the attribute allocation and multi-attribute authority, attribute cancellation three models to do the algorithm to improve, from the performance and security of a number of angles to design a suitable for the cloud computing environment access control model.

Analyzing the security of Windows 7 and Linux for Cloud Computing

Analyzing the security of Windows 7 and Linux for Cloud Computing We Review and analyze the major security features and concerns in Deploying Xiandai commodity keyboard-based Bae such as Windows 7 an ...

The misuse of cloud browsers adds to cloud computing threats

Through the misuse of cloud browsers such as Amazon Silk, Cloud Browse, Opera Mini and Puffin, anonymous access to large-scale cloud computing tasks is no doubt a bombshell that has thrown off a heavy bomb in a precarious cloud security trust. Security researchers show that cloud computing can be used indiscriminately without cost, as long as it can find out where its processing cycles are. Just as Amazon and Google launched a raging cloud-computing price war, no cloud-computing company could beat the learning ...

Four security issues to torture SaaS and cloud computing

First, the cloud standard is very weak ISO27001 is a fairly comprehensive standard that covers a wide range of customer-focused operational security issues. "This is, for me, at least a basic basis for assessing the maturity of SaaS providers," said Chenxiwang, a Forrester analyst. However, handing your data to suppliers passing the ISO27001 standard does not guarantee the security of your data. The survey found that many companies claimed to conform to the ISO27001 standards, and then admitted "there is a shortage of privileged user management ...

Data "Clouds" does not increase security risk

Huge amounts of data are transferred to the "cloud" beyond the user's control, and for companies with sensitive information, it is inevitable to worry about information security issues. It is worth exploring whether cloud computing will increase the security risks of IT systems and information assets. Many experts say from a certain point of view, "clouds" data will be more secure, because the enterprise will not only rely on the services provided by the cloud service provider, but also drive it to adapt and explore new ways to protect enterprise systems and information assets, thus forming a new cloud security control mechanism. The problem of cloud is ultimately solved by the way of cloud. Cloud ...

Cloud security remains China's cloud computing development elbow

With the continuous development of cloud computing technology in China, the development of cloud computing market in our country can be said to be in full swing. But the Chinese people also have to "Great leap forward" thought, the slogan shout of loud, the actual application is really flawed, especially cloud security problem. Since the advent of cloud computing, whether international or domestic cloud security issues have been the development of the cloud computing elbow, enterprises if the transformation of cloud computing must consider the security of cloud computing. Cloud computing is potentially a huge security risk when it has huge business opportunities. The development of cloud computing exists: Isolation failure risk, compliance risk, management interface damage risk, data deletion not Beecher ...

Research on the current situation of cloud computing security related standards

A preliminary study on the research status of cloud computing security standards Genbin Cloud Computing offers a wide range of application prospects, but it poses new challenges to the application of traditional information security technologies in the cloud computing model, where security and standardization are key to many of the problems facing cloud computing. At present, national government agencies and research organizations are actively working on the relevant issues, this paper focuses on the study of cloud computing security standards, introduces the current major cloud security standards, and outlines the standard research in cloud computing security, and makes a brief analysis of its main research results, hoping for the security of domestic cloud computing ...

Research on security risk and countermeasure of public cloud based on model analysis

Research on public cloud security risk and countermeasure based on model analysis Chen Qiyun Chen Zhikang proposes a public cloud security model to analyze the security risks involved in public cloud from multiple dimension systems, which is helpful to classify and analyze the security risks of public cloud in a clear and complete way.   This paper analyzes the security risks peculiar to public cloud service, and gives the solution with strong maneuverability. Keywords: cloud computing public cloud security security Model temp ...

Four suggestions for large data information security in China

As the "new Oil of the future", large data is becoming another hot spot in the field of information technology after cloud computing and Internet of things. However, the existing information security means can not meet the requirements of information security in the age of large data. While large data brings challenges to information security, it also provides new opportunities for the development of information security. The author believes that large data has become a significant target of cyber attacks, increased the risk of privacy disclosure, threats to existing storage and security measures, as the carrier of high-level sustainable attacks. On the one hand, large data technology has become a means to exploit the hacker's attack, on the other hand, it provides new support for information security. ...

Against the trend or to conform to the tide how to look at cloud storage security

The application of cloud computing will inevitably require cloud storage to provide storage security for cloud information, so cloud storage is an inevitable trend of social development and technology development. Cloud storage is now a tangle of various pros and cons of the state, like people without scruple in use, while the relatively cautious people while looking at the convenience of cloud storage, while observing the security threats of cloud storage. Cautious people are not alarmist, this year, Amazon, Google and so on the world's largest transport service providers, successive, repeated occurrence of downtime and other accidents, and then bring users inconvenience, some even caused the user permanent data ...

Side effects of security: advantages and disadvantages of cloud computing security

Computer security was an easy job decades ago, and computers in that era were placed in a tightly guarded room. The head of the engine room will take your punch card in front of the window, and as long as the card that holds the code is not folded, damaged or truncated, it will be read by the Hollerith reader and executed on the computer. Only one program can be executed at a time. Of course, if your program is wrong, it will be a few hours or a few days after the supervisor returned to request debugging. (in the age of the FWIW card rule, careful design, architecture and desk checks are routine;

Cloud computing security with nymble Marvell

Cloud computing security with nymble Marvell Mr.pradip u.wawge ku.ashvini r.rathod Amit r.manakshe keywords:misbehave Blacklisting, privacy, security, revocation, Erro ...

Research on privacy protection technology in cloud computing based on population information system

Research on privacy protection technology in cloud computing based on population Information system Beijing posts of Beijing posts and new Yu the Privacy protection model proposed in this paper is to solve the problem of data privacy disclosure in the population information system, which is confronted with the data storage to the cloud service platform. Through the introduction of data slicing based on mutual exclusion data and the data slice identification generated by the semi trusted third party privacy protection strategy, it achieves the storage flow of population information system data in the model, the deletion of population information system data and the privacy protection of the reading process. Finally, the safety index of the model is ...

McAfee: Layout China Cloud security

Following the cooperation with the Chinese branch to launch a dedicated enterprise users and research and development of the enterprise version of antivirus software "Hope Cloud Security", McAfee and Beijing Bao Limingwei Software Technology Co., Ltd. to launch the Cloud security services (Poly SaaS), to provide for mail filtering and Internet management cloud security services. A few days ago, Beijing Bao Limingwei Software Technology Co., Ltd. announced to join hands with McAfee Mutual Treasure Cloud security services (Poly SaaS), will McAfee Security technology (based on mail filtering McAfee SaaS email homeowner and Internet Management MC ...)

Authorization access control of privacy protection in public cloud

Privacy preserving delegated Access control in public clouds Mohamed Nabeel, Elisa Bertino We utilize a efficient group key Management scheme that supports expressive ACPs. Our system assures th ...

An approach initiating security Kyoto towards Cloud Computing

An approach initiating security Kyoto towards Cloud Computing Amit Joshi bhavesh Joshi Manuj Joshi The monitors proposes a SE Curity Model and also standards Accordin ...

Cloud computing security: Good and bad data encryption

Many studies have shown that there is a big divergence between cloud service providers and their customers about who should be responsible for the security of customer data: Suppliers put their responsibilities in the hands of customers, but customers generally disagree.    According to a survey conducted by the Ponemon Institute last year, seven of the 10 cloud service providers gave customers the security responsibility for their data, and only 30% of the customers agreed. Pravinkothari, chief executive and founder of cloud security provider CipherCloud, said, "The supplier is not responsible if you host the data to the cloud ...

Enhancement of Safety in Cloud Computing

Enhancement of Safety in Cloud Computing geethu Thomas, Janardhanan P S keywords:cloud Computing, IDS, DoS, intrusion Toleranc E, proxy server temp_1207241 ...

CLOUD COMPUTING Security in BUSINESS information Bae

CLOUD COMPUTING Security in BUSINESS information Bae Sasko Ristov, Marjan Gusev and Magdalena Kostoska at this monitors we Analyze main Analysys and industrial standards targeting information ...

Recent advances in Cloud

Recent advances in Cloud security Jiyi Wu-aspires gives a quick introduction to Cloud security. It covers the key technologies of cloud computing, security challenge and problem in cloud Compu ...

Total Pages: 2156 1 .... 1395 1396 1397 1398 1399 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.