earticle

논문검색

Technology Convergence (TC)

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

초록

영어

The inference for this research was concentrated on client’s data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software’s and hardware’s are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client’s necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client’s info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

목차

Abstract
1. INTRODUCTION
2. COMPONENT OF CLOUD
2.1 Clients
2.2 Thick
2.3 Thin
2.4 Mobile
2.5 Distribute Server
2.6 Data Center
3. PREVIOUS WORK
4. METHODOLOGY
4.1 Access Control Model
5. ARCHITECTURE OF DEVELOPED ACCESS CONTROL MODEL FOR CLOUD
6. WORKFLOW MODEL FOR ACCESS CONTROL IN CLOUD ENVIRONMENTS
7. HYPOTHESIS
8. ALGORITHM FOR DEVELOPED MODEL
9. IMPLEMENTING PRIVATE CLOUD
10. CLOUD SECURITY FRAMEWORK
11. RESULTS
11.1 Evaluation of Developed Access Control Model
12. CLIENT-BASED USER AUTHENTICATION (CBUA)
12. EVALUATION OF DEVELOPED MODEL
13. PERFORMANCES
13.1 Security
REFERENCES

저자정보

  • Ahmed Mateen Computer Science Department, Chongqing University, Chongqing China. Computer Science Department, University of Agriculture Faisalabad, Pakistan
  • Qingsheng Zhu Computer Science Department, Chongqing University, Chongqing China.
  • Salman Afsar Computer Science Department, University of Agriculture Faisalabad, Pakistan
  • Akmal Rehan Computer Science Department, University of Agriculture Faisalabad, Pakistan
  • Imran Mumtaz Computer Science Department, University of Agriculture Faisalabad, Pakistan
  • Wasi Ahmad Department of Information Technology Resource Center and Data Bank (ITRCDB), University of Agriculture Faisalabad, Pakistan.

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.