A Security Architecture Research Based on Roles

Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there are some common ground and new problems. In cloud computing environment, different users need different security requirements, so if we can assign them reasonable authority, there will be great efficiency improvement for data security and system efficiency. Role is an authority division and management method, it gains very good effect for its classification to user and data operations. Inspired by this, a security cloud computing architecture based on role has been designed, the security of the architecture has been evaluated at last.

[1]  曹继翔 Cloud computing security system and method , 2014 .

[2]  G.Madhu kumar,et al.  Design and implementation of convolution encoder and viterbi decoder , 2012 .

[3]  Chi Li-ying Research on Security Architecture of Cloud Computing and its Key Technologies , 2012 .

[4]  Liu Bao-xu Model for Cloud Computing Security Assessment Based on Classified Protection , 2013 .

[5]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[6]  Sanjaya Dahal,et al.  Security Architecture for Cloud Computing Platform , 2012 .

[7]  Muthu Ramachandran Component-Based Development for Cloud Computing Architectures , 2011 .

[8]  Mohamed Ali Maher,et al.  Ballistic Characterization Of A Typical Military Steel Helmet , 2017 .

[9]  Xu Ji Cloud Computing Security: Architecture, Mechanism and Modeling , 2015 .

[10]  Ashutosh Kumar Singh,et al.  A Review Of Cloud Computing Open Architecture And Its Security Issues , 2012 .

[11]  Takuya Suzuki,et al.  Security Architectures for Cloud Computing , 2010 .

[12]  Robin Singh Bhadoria Security Architecture for Cloud Computing , 2015 .

[13]  D. M. Hutton,et al.  Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .

[14]  Vic Winkler Introduction to Cloud Computing and Security , 2011 .

[15]  Meikang Qiu,et al.  A Review on Cloud Computing: Design Challenges in Architecture and Security , 2011, J. Comput. Inf. Technol..