A secured resource access management in educational cloud computing environment
暂无分享,去创建一个
The paper discusses the problems of data security in the Cloud Computing and proposes an approach based on network technologies and algorithms. The main idea is to establish a criterion of trust between the service provider and the client to control data access and updates which are operated by the owner or a third party. The method allows limiting and filtering the access, to detect corrupted data and proposes corrective action in the case of an illegal access to the cloud computing services. Similarly, this approach examines the strategies to secure the resources through a distributed cloud computing.
[1] P. Dhanalakshmi,et al. REMOTE DATA INTEGRITY IN CLOUD SECURITY SERVICES , 2013 .
[2] Karsten Weihe,et al. The vertex-disjoint menger problem in planar graphs , 1997, SODA '93.
[3] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.