Ahmed Mateen, Qingsheng Zhu, Salman Afsar, Akmal Rehan, Imran Mumtaz, Wasi Ahmad
언어
영어(ENG)
URL
https://www.earticle.net/Article/A368015
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
The inference for this research was concentrated on client’s data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software’s and hardware’s are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client’s necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client’s info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.
목차
Abstract 1. INTRODUCTION 2. COMPONENT OF CLOUD 2.1 Clients 2.2 Thick 2.3 Thin 2.4 Mobile 2.5 Distribute Server 2.6 Data Center 3. PREVIOUS WORK 4. METHODOLOGY 4.1 Access Control Model 5. ARCHITECTURE OF DEVELOPED ACCESS CONTROL MODEL FOR CLOUD 6. WORKFLOW MODEL FOR ACCESS CONTROL IN CLOUD ENVIRONMENTS 7. HYPOTHESIS 8. ALGORITHM FOR DEVELOPED MODEL 9. IMPLEMENTING PRIVATE CLOUD 10. CLOUD SECURITY FRAMEWORK 11. RESULTS 11.1 Evaluation of Developed Access Control Model 12. CLIENT-BASED USER AUTHENTICATION (CBUA) 12. EVALUATION OF DEVELOPED MODEL 13. PERFORMANCES 13.1 Security REFERENCES
키워드
access control modelcloud storagepublic cloud architecturenetwork security
저자
Ahmed Mateen [ Computer Science Department, Chongqing University, Chongqing China. Computer Science Department, University of Agriculture Faisalabad, Pakistan ]
Corresponding author
국제문화기술진흥원 [The International Promotion Agency of Culture Technology]
설립연도
2009
분야
공학>공학일반
소개
본 진흥원은 문화기술(Culture Technology) 관련 산·학·연·관으로 구성된 비영리 단체이다. 문화기술(CT)은 정보통신기술(ICT), 문화적 사고 기반의 예술, 인문학, 디자인, 사회과학기술이 접목된 신융합기술(New Convergence Technology, NCT)로 정의한다. 인간의 삶의 질을 향상시키고, 진보된 방향으로 변화시키고, 문화기술 관련 분야의 학술 및 기술의 발전과 진흥에 공헌하기 위하여, 제3조의 필요한 사업을 행함을 그 목적으로 한다.
간행물
간행물명
International Journal of Advanced Culture Technology(IJACT)
간기
계간
pISSN
2288-7202
eISSN
2288-7318
수록기간
2013~2025
등재여부
KCI 등재
십진분류
KDC 600DDC 700
이 권호 내 다른 논문 / International Journal of Advanced Culture Technology(IJACT) Volume 7 Number 4