Proceedings of the 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016)

The Cloud Data Security and Access Control Model in the Study

Authors
Jing Dong
Corresponding Author
Jing Dong
Available Online February 2017.
DOI
https://doi.org/10.2991/emcm-16.2017.94How to use a DOI?
Keywords
Cloud computing; Utility security; Access control; Strategy optimization and security analysis
Abstract
Cloud computing is a kind of based on the calculation of the Internet, through the cloud computing, to other computers and other devices to share information and resources. Although it can bring convenience, operated and managed in a cloud computing infrastructure services in the security problem of nots allow to ignore. After the cloud security problem analysis, put forward the safety of the infrastructure services is the foundation of cloud computing security. Then, on the basis of the traditional access control model to take into consideration the characteristics of cloud computing infrastructure services, design a set of access control model. The model well enhanced the security of cloud computing infrastructure services.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016)
Part of series
Advances in Computer Science Research
Publication Date
February 2017
ISBN
978-94-6252-297-8
ISSN
2352-538X
DOI
https://doi.org/10.2991/emcm-16.2017.94How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Jing Dong
PY  - 2017/02
DA  - 2017/02
TI  - The Cloud Data Security and Access Control Model in the Study
BT  - 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016)
PB  - Atlantis Press
SN  - 2352-538X
UR  - https://doi.org/10.2991/emcm-16.2017.94
DO  - https://doi.org/10.2991/emcm-16.2017.94
ID  - Dong2017/02
ER  -