One of the cloud computing infrastructures is to provide a reliable and secure data storage center, so storage security is one of the security topics in the Cloud computing field. Storage security in cloud storage applications includes data encryption storage, security policy management, security logging, and auditing. Security logs and audits provide the necessary audit information for both the monitoring system and the active user. Especially the security control of data access is especially important, and the access control mechanism of data is a subject to be studied in the tradeoff of providing security and convenience for users to share. Amazon S3 S3, EMC Atmos on ...
Nowadays, cloud storage is becoming a popular product in any area, business or home. Just as services like Amazon S3, Box, Copiun, and Thru have feature-rich products that make it easy for users to back up, sync, and store documents and files. Although for ordinary consumers there is not much to worry about when using such services, there are many security issues that need to be addressed, from encryption to data lifecycle management, to organizations, when choosing cloud storage services. Emerging areas of the business focus on defining and controlling access methods and their definitions based on ...
Although ordinary consumers do not need to worry too much when using such services, there are many security issues that need to be addressed when choosing a cloud storage service from encryption to data lifecycle management. The emerging areas of enterprise focus on defining and controlling access methods and defining the implementation of control based on cloud storage. In this article, we will explain why cloud storage access control is an important issue and what enterprises should consider when developing and implementing cloud storage access control and architecture. We will also discuss how to evaluate access control in the cloud provider context. ...
Study on data access control strategy of meteorological cloud based on attribute encryption Fangzhong Xiazhihua Zhou Shu with the increasing of meteorological service level, the problem of cloud storage and instant sharing of meteorological data is becoming more and more prominent. Aiming at the problem of identity authentication and access control for meteorological data storage and sharing in cloud computing environment, an access control model of attribute encryption based on multiple authorization is proposed. This model adopts a kind of attribute encryption scheme which is suitable for large data in cloud environment, solves the problem of fine-grained access control of data in meteorological department, and introduces the concept of global ID and multiple authorization mechanism to solve ...
Today, CA Technologies, a provider of cloud computing solutions, officially announced the CA Access Control for Virtual Environments solution, which extends its identity and access management (IAM) security expertise, Can complement and protect VMware virtual environments. With a perfect solution to several security and compliance issues and to help control privileged users' access to the virtual environment, the CA virtual environment ...
Research on access control of management information system based on cloud computing Chongqing in this paper, the existing workflow technology and access control model are fully studied, based on the TRBAC model of the most suitable workflow management system, some improvements are made to the model from the angle of application. This model introduces the role concept of role-based access control into task-based access control, the core idea of which is to enable the user to access the data by acquiring a role (but the authorization step that contains the permission must be activated, otherwise the role's permissions will be frozen). ...
Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...
December 2014 12-14th, hosted by the China Computer Society (CCF), CCF large data Expert committee, the Chinese Academy of Sciences and CSDN co-organizer of the 2014 China Large Data Technology conference (DA data Marvell Conference 2014,BDTC 2014 will be opened at Crowne Plaza Hotel, New Yunnan, Beijing. The three-day conference aims to promote the development of large data technology in the industry, and to set up "large data Infrastructure" and "large data ..."
Research and realization of access control subsystem based on attribute encryption in cloud storage Sun Youpeng because of the complexity of the cloud environment, the various entities are not trusted, so password access control technology to prevent user data leakage is the most direct means. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. Including the lack of access policy expression, permission to withdraw ...
Research and implementation of cloud storage access control technology based on ontology Ecust Hong based on the characteristics of cloud storage access control and cloud storage standard (CDMI), this paper improves the access control domain, storage object and role inheritance of RBAC model, and increases the time constraint on roles and permissions. At the same time, using ontology technology and owl language, the ontology of access control model is established, and the semantic technology describes the entity and strategy of DONTO_RBAC, which realizes the security strategy of access control in the multi domain environment through ontology, which is based on the ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.