The Cloud Data Security and Access Control Model in the Study
Available Online February 2017.
- https://doi.org/10.2991/emcm-16.2017.94How to use a DOI?
- Cloud computing; Utility security; Access control; Strategy optimization and security analysis
- Cloud computing is a kind of based on the calculation of the Internet, through the cloud computing, to other computers and other devices to share information and resources. Although it can bring convenience, operated and managed in a cloud computing infrastructure services in the security problem of nots allow to ignore. After the cloud security problem analysis, put forward the safety of the infrastructure services is the foundation of cloud computing security. Then, on the basis of the traditional access control model to take into consideration the characteristics of cloud computing infrastructure services, design a set of access control model. The model well enhanced the security of cloud computing infrastructure services.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Jing Dong PY - 2017/02 DA - 2017/02 TI - The Cloud Data Security and Access Control Model in the Study BT - 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/emcm-16.2017.94 DO - https://doi.org/10.2991/emcm-16.2017.94 ID - Dong2017/02 ER -